US20150371234A1 - Methods, devices, and systems for secure provisioning, transmission, and authentication of payment data - Google Patents

Methods, devices, and systems for secure provisioning, transmission, and authentication of payment data Download PDF

Info

Publication number
US20150371234A1
US20150371234A1 US14/511,994 US201414511994A US2015371234A1 US 20150371234 A1 US20150371234 A1 US 20150371234A1 US 201414511994 A US201414511994 A US 201414511994A US 2015371234 A1 US2015371234 A1 US 2015371234A1
Authority
US
United States
Prior art keywords
card
server
dcvv
mst
track data
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Abandoned
Application number
US14/511,994
Inventor
Enyang Huang
William Wang Graylin
George Wallner
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Samsung Electronics Co Ltd
Original Assignee
Samsung Pay Inc
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Samsung Pay Inc filed Critical Samsung Pay Inc
Priority to US14/511,994 priority Critical patent/US20150371234A1/en
Priority to SG10201702208RA priority patent/SG10201702208RA/en
Priority to RU2016118742A priority patent/RU2648944C2/en
Priority to CN201610115717.XA priority patent/CN105701661B/en
Priority to EP15751639.4A priority patent/EP3061056B1/en
Priority to CA2927113A priority patent/CA2927113C/en
Priority to KR1020167014095A priority patent/KR101784125B1/en
Priority to JP2016537567A priority patent/JP6263624B2/en
Priority to KR1020177009092A priority patent/KR101815430B1/en
Priority to PCT/US2015/015855 priority patent/WO2015126753A1/en
Priority to AU2015219276A priority patent/AU2015219276B2/en
Priority to SG11201602941WA priority patent/SG11201602941WA/en
Priority to CN201580000178.9A priority patent/CN105027153A/en
Priority to EP16174401.6A priority patent/EP3113095A1/en
Assigned to LOOPPAY, INC. reassignment LOOPPAY, INC. ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: WALLNER, GEORGE, GRAYLIN, WILLIAM WANG, HUANG, ENYANG
Assigned to SAMSUNG PAY, INC. reassignment SAMSUNG PAY, INC. CHANGE OF NAME (SEE DOCUMENT FOR DETAILS). Assignors: LOOPPAY, INC.
Priority to HK16111280.8A priority patent/HK1223179A1/en
Priority to HK15112404.8A priority patent/HK1211724A1/en
Publication of US20150371234A1 publication Critical patent/US20150371234A1/en
Priority to US14/980,718 priority patent/US9864994B2/en
Priority to AU2016202504A priority patent/AU2016202504B2/en
Priority to JP2016115371A priority patent/JP6214724B2/en
Assigned to SAMSUNG ELECTRONICS CO., LTD. reassignment SAMSUNG ELECTRONICS CO., LTD. ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: SAMSUNG PAY INC
Abandoned legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/08Payment architectures
    • G06Q20/20Point-of-sale [POS] network systems
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/30Payment architectures, schemes or protocols characterised by the use of specific devices or networks
    • G06Q20/32Payment architectures, schemes or protocols characterised by the use of specific devices or networks using wireless devices
    • G06Q20/327Short range or proximity payments by means of M-devices
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/30Payment architectures, schemes or protocols characterised by the use of specific devices or networks
    • G06Q20/34Payment architectures, schemes or protocols characterised by the use of specific devices or networks using cards, e.g. integrated circuit [IC] cards or magnetic cards
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/30Payment architectures, schemes or protocols characterised by the use of specific devices or networks
    • G06Q20/36Payment architectures, schemes or protocols characterised by the use of specific devices or networks using electronic wallets or electronic money safes
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/30Payment architectures, schemes or protocols characterised by the use of specific devices or networks
    • G06Q20/36Payment architectures, schemes or protocols characterised by the use of specific devices or networks using electronic wallets or electronic money safes
    • G06Q20/363Payment architectures, schemes or protocols characterised by the use of specific devices or networks using electronic wallets or electronic money safes with the personal data of a user
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/382Payment protocols; Details thereof insuring higher security of transaction
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/382Payment protocols; Details thereof insuring higher security of transaction
    • G06Q20/3823Payment protocols; Details thereof insuring higher security of transaction combining multiple encryption tools for a transaction
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/385Payment protocols; Details thereof using an alias or single-use codes
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/40Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/40Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
    • G06Q20/401Transaction verification
    • G06Q20/4018Transaction verification using the card verification value [CVV] associated with the card
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/40Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
    • G06Q20/409Device specific authentication in transaction processing
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/40Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
    • G06Q20/409Device specific authentication in transaction processing
    • G06Q20/4097Device specific authentication in transaction processing using mutual authentication between devices and transaction partners
    • G06Q20/40975Device specific authentication in transaction processing using mutual authentication between devices and transaction partners using encryption therefor

Definitions

  • the present disclosure relates to magnetic stripe data storage and secure transmission thereof.
  • financial payment cards contain a card number, called the Primary Account Number or PAN, whose purpose is to identify the account the payment is made against. Cards also carry an Expiry Date, which indicates when the card expires. Most cards also carry in the magnetic stripe data a cryptographically generated Card Validation Value (also known as a CVV1), which prevents a valid card to be created from its PAN and Expiry Date information. Typically, cards are replaced after about 2 to 3 years, as the magnetic stripe gets worn out and issuers do not want a card to be active indefinitely.
  • PAN Primary Account Number
  • CVV1 cryptographically generated Card Validation Value
  • the PAN and Expiry Date are hard to keep secret: they are printed on the front of the card and are contained in the magnetic stripe data or chip data of the card. During the POS transaction the magnetic stripe or the chip is read by the terminal and its data (including the PAN, expiry date, and CVV2) is transmitted through the retailer's system to the acquirer and then to the card issuer.
  • the PAN, and to a lesser extent the Expiry Date, are used for a number of functions by retailer systems and cannot be obscured.
  • the magnetic stripe or chip card data is the target of data theft, either in transit or when in memory. Being static, the magnetic stripe data is subject to interception and copying, and a number of attacks. Stolen data, from which the PAN and Expiry Date can be easily extracted, can be used in fraudulent CNP transactions.
  • a physical card can be skimmed by reading the magnetic stripe data on the card, or putting a reading device proximate to retailer POS terminals to capture magnetic stripe track data including the PAN and Expiry Date and the name on the card.
  • a sniffing device can also be used to pick up track data from contactless cards in purses and wallets of unsuspecting shoppers at a retail establishment.
  • Malware in a retailers POS system can also be used to capture the card data in route to the payment processor.
  • Such stolen data may contain the PAN and the Expiry Date, both in magnetic stripe and smart card (for example, an Europay, MasterCard and Visa (EMV) card) transactions and can be used for CNP fraud.
  • captured magnetic stripe data also includes the CVV1
  • captured online card data can include the CVV2.
  • CVV1 and CVV2 The key weakness of both CVV1 and CVV2 is that they are static: once learned they can be used in fraudulent transactions.
  • the present disclosure relates to devices, systems, and methods involving a magnetic stripe storage and transmission device (also referred to as a MST (magnetic secure transmission) device) for use in conjunction with a mobile wallet application and platform to capture, store and transmit magnetic stripe card data to merchants' conventional point of sale (POS) terminals and other devices with magnetic stripe readers (MSRs) or online checkout systems, in physical and virtual environments.
  • MST magnetic secure transmission
  • the present disclosure also relates to devices, systems, and methods for converting static card data (for example, the CVV1 or CVV2) into dynamic cryptograms that can only be used one time, and cannot be replayed by fraudsters, and leveraging mobile devices to deliver payment information that includes the cryptograms back to the card issuer for authentication, without changing the existing merchant acceptance infrastructure whether it is for physical payment via POS or remote payment via online checkout.
  • the devices, systems, and methods allow users to automatically convert the static card data into dynamic one time use card data that can be authenticated by the payment network or processor on behalf of the thousands of card issuers as a service, without infrastructure change and integration by each issuer.
  • a dynamic cryptogram which can be called a dynamic-CVV (dCVV) is used to secure card payments.
  • a dCVV is generated freshly with a key plus primary account number (PAN), expiration or expiry date (EXP), timestamp and counter, when the card is used for payment in both Card-Not-Present (CNP) and Card-Present (CP) transactions.
  • PAN primary account number
  • EXP expiration or expiry date
  • timestamp and counter when the card is used for payment in both Card-Not-Present (CNP) and Card-Present (CP) transactions.
  • the dCVV which is cryptographically generated, cannot be generated without the knowledge of the card data and a secret key. Also, each dCVV is only valid for a short period of time. This prevents the replaying attack described above, since re-use of the dCVV from a previously monitored transaction will result in an authorization error.
  • the card issuer or a stand-in service provider may differentiate CP transactions that use dCVV technology, because the validation algorithm used is different for dCVV transaction as opposed to ordinary magnetic stripe CP transactions.
  • the dCVV transactions may be identified by replacing the EXP of the card data with a number equivalent to a date far into the future recognizable by the issuer or service provider. This obscures the EXP in a payment transaction while providing the card issuer with a convenient flag to recognize the card as being in dCVV mode. Other flags can be used to indicate the card is in dCVV mode, such as a flag in a discretionary field of the track data used to indicate dCVV mode.
  • the PAN can also be registered in the issuer or service provider's database as a dCVV card.
  • CNP transactions a dynamically generated 3 digit code (or 4 digit code in the case of American Express cards) retrieved from the mobile wallet application, is dynamically computed at the time of request, is entered into the checkout web site or application.
  • the masked EXP also retrieved from the mobile wallet application, to be entered also uses a date far in the future indicating that this is a dCVV CNP transaction. This way both the original CVV-2 and EXP are hidden from an attacker monitoring the transaction.
  • intercepting a particular CNP transaction does not lead to an attacker using the information in another transaction, because the CVV code is computed in real-time and changes between CNP transactions, and is time stamped so that it would expire after a short time.
  • the devices, systems, and methods effectively allow cardholders to convert existing magnetic stripe card data into dynamic tokenized dynamic card data using mobile devices without requiring the card issuers to setup a separate remote mobile provisioning system.
  • the card issuer, the issuer's processor, or the issuer's payment network may host the Provisioning Authentication Server (PAS) to authenticate the dCVV packaged in the MST transmission, or dCVV2 for online transactions, and either validate for the issuer the dynamic payment data is authentic, or validate and return the original track data (in the case of the payment network,) or original CVV2 back to the issuer or its processor so that the payment network can do the authentication service (or tokenization service) on behalf of the card issuer.
  • PAS Provisioning Authentication Server
  • FIG. 1 is a functional diagram of an overview of a system according to aspects of the disclosure
  • FIG. 2 is a flow diagram of a method of operation of initializing an MST according to aspects of the disclosure
  • FIG. 3 is a flow diagram of a method of provisioning a static card based on a user swiping the card according to aspects of the disclosure
  • FIG. 4 is a flow diagram of a method of provisioning a static card from a card issuer according to aspects of the disclosure
  • FIG. 5 is a flow diagram of a method of dynamically provisioning a card according to aspects of the disclosure.
  • FIG. 6 is a flow diagram of a method of provisioning a card according to aspects of the disclosure.
  • FIG. 7 is a flow diagram of a method of provisioning a dynamic card according to aspects of the disclosure.
  • FIG. 8 is a flow diagram of a method of performing dynamic-CVV (dCVV) according to aspects of the disclosure
  • FIG. 9 is a flow diagram of another method of performing dCVV according to aspects of the disclosure.
  • FIG. 10 is a diagram of modifying an expiration date of card data according to aspects of the disclosure.
  • FIG. 11 is a block flow diagram of a method of performing dCVV for e-commerce transactions according to aspects of the disclosure.
  • FIG. 12 is a functional block diagram of the MST according to aspects of the disclosure.
  • the present disclosure relates to leveraging magnetic stripe data storage and secure transmission devices to deliver secure cryptographic one time use payment data on existing payment acceptance infrastructure.
  • the overall system 100 includes a MST 102 , a mobile communication device 104 , a wallet server 106 , a provisioning and authentication server 108 , a card issuer server 110 , an acquirer server 112 , a point of sale (POS) 120 , a payment network server 122 , a processor server 124 (e.g., a third party processor server of the issuer), and an encrypted magnetic stripe reader 126 (MSR) which can be part of the MST 102 (as illustrated in FIG. 12 ) or work alone with a wallet application on the mobile communication device 104 .
  • MSR encrypted magnetic stripe reader
  • the MST 102 interfaces with the mobile communication device 104 or may be embedded in the mobile communication device 104 , and the mobile communication device 104 communicates with the wallet server 106 , provisioning and authentication server 108 , card issuer server 110 , and acquirer server 112 via a network 114 .
  • Each of the wallet server 106 , provisioning and authentication server 108 , card issuer server 110 , acquirer server 112 , payment network server 122 , and processor server 124 may also communicate with one another via the network 114 .
  • the wallet server 106 may include one or more databases 116 and user accounts 118 .
  • the one or more databases 116 may store association data of the MST 102 and the user accounts 118 , and one or more keys used by the MST 102 and/or the wallet server 106 .
  • the MST 102 may be registered with a user account 118 , as described in further detail below.
  • provisioning and authentication server 108 may also include one or more databases and other components, such as, software and/or hardware to allow for the methods disclosed herein to be performed.
  • the MST 102 may be a dongle that may be connected to and disconnected from the mobile communication device 104 .
  • the MST 102 may communicate with the mobile communication device 104 through an audio port and/or through other types of communication interfaces, for example including, but not limited to, a USB port, a 30 pin or 9 pin Apple interface, a Bluetooth interface, a near field communication (NFC), and other serial interfaces.
  • the MST 102 is illustrated as a dongle, the MST may be another type of peripheral device that communicates with the mobile communication device 104 through a contactless interface, such as Bluetooth or NFC; or the MST 102 may be embedded inside of the mobile communication device 104 as part of mobile communication device 104 .
  • a user may set up the user account 118 on the wallet server 106 , for example, by downloading and/or installing a wallet application on the mobile communication device 104 .
  • the wallet application 104 may be an interface for a user to view a list of cards available for Card-Not-Present (CNP) and Card-Present (CP) transactions.
  • CNP Card-Not-Present
  • CP Card-Present
  • the user may choose or select a card and transmit card data corresponding to the card (for example, card track data) using the MST 102 , in either a static or a dynamic-CVV (dCVV) mode.
  • the user may view a dynamically computed Expiry Date (EXP) and CVV-2 and use them to fill checkout web forms to perform a dCVV CNP transaction.
  • EXP Dynamic Expiry Date
  • CVV-2 dynamically computed Expiry Date
  • the user may also set up the user account 118 using a computer connected to the network 114 by accessing a user account web portal.
  • the user may specify a username, password and a personal PIN.
  • the password may be used to login to the wallet application on the mobile communication device 104 .
  • the personal PIN may be used to enter a payment card section of the wallet application, as well as to unlock the wallet application.
  • the user may optionally add the MST 102 to the user account 118 by specifying a globally unique identifier (GUID) of the MST 102 (also referred to herein as ID MST ).
  • GUID globally unique identifier
  • the PIN (which only the user knows) is used to authenticate with the MST 102 to operate any card data stored on the MST 102 .
  • a copy of the PIN may also be stored on the wallet server 106 and used as described below. Operation of the MST 102 using the PIN-based authentication can be done with or without the mobile communication device 104 being connected to the wallet server 106 via the network 114 . This allows the MST 102 to be operated to utilize the card data stored on the MST 102 , even when no network connection exists.
  • the MST 102 can store magnetic stripe card data by either an initial load at manufacturing, loading via a wireless communication network after setting up the user account 118 , and/or by the consumer loading his/her own card(s) data directly into the MST 102 using encrypted MSR prompted by the mobile wallet application.
  • the MST 102 may transmit the magnetic stripe card data in both static (in which it transmits the original data without modification) and in dCVV mode (in which part of the data is dynamically computed each time during transmission).
  • the user is a person that has set up a user account, for example, on the wallet server 106 via a cloud computing infrastructure (such as via the network 114 ), and has initialized the wallet application on his/her mobile communication device 104 .
  • a method 200 of initializing the MST 102 , having a unique device ID, to a user account 118 according to an illustrative embodiment is described with reference to FIG. 2 .
  • An MST is initialized or registered for the first time to a user account by plugging in or connecting the MST to the mobile communication device, illustrated as block 202 .
  • the wallet application Upon connecting the MST to the mobile communication device, the wallet application recognizes the MST and registers the MST with the user account of the user, illustrated as block 204 .
  • the MST and the user account may perform a handshake, illustrated as 206 , and send and receive commands, illustrated as block 208 .
  • the user can use the wallet application to load his/her cards by swiping the cards on a built in MSR of the MST or a separate MSR that may be connected to the MST or the mobile communication device.
  • the card data may be digitized and encrypted, and stored in the MST for later use.
  • the cards may be used by the MST 102 and sent to a point of sale (POS) 120 to effect a transaction.
  • POS point of sale
  • the POS may also communicate with one or more of the wallet server 106 , provisioning and authentication server 108 , card issuer server 110 , and/or the acquirer server 112 , via the network 114 .
  • a method 300 for securely provisioning a static card based on a user swiping the card according to an illustrative embodiment is described with reference to FIG. 3 .
  • “static” means that the same card data is transmitted to the POS each time when used.
  • the user may use a swiper device integrated into or coupled to the MST to load cards into the user's MST.
  • the MST then encrypts the TRACK using a key (K working) ( 304 ) and sends the encrypted TRACK and a key serial number (KSN) (for example, a 10-byte KSN) to the mobile communication device ( 306 ).
  • KSN key serial number
  • the KSN contains a monotonically increasing counter; therefore swiping the same card twice should yield two distinct pieces of cipher-text.
  • the MST may also send some auxiliary information (A*) that may be used by the wallet server when the wallet server later performs a signature verification, as described below.
  • A* auxiliary information
  • the MST sends the following to the mobile communication device: ⁇ TRACK ⁇ K working , KSN, A*, where the brackets indicate an encryption function.
  • the mobile communication device queries the MST for its identifier (ID MST ) and session nonce R MST ( 308 ). In response to the query, the MST sends the ID MST and R MST to the mobile communication device ( 310 ). The mobile communication device forwards this information (for example, ID MST , R MST , ⁇ TRACK ⁇ K working , KSN, A*) to the wallet server, plus the user's input credential(s) (for example, a username and password) for the wallet server to authenticate ( 312 ).
  • ID MST identifier
  • R MST session nonce
  • the mobile communication device forwards this information (for example, ID MST , R MST , ⁇ TRACK ⁇ K working , KSN, A*) to the wallet server, plus the user's input credential(s) (for example, a username and password) for the wallet server to authenticate ( 312 ).
  • the wallet server authenticates the user using the username and password, and also checks to see if the ID MST is currently connected to the user's wallet account ( 314 ).
  • the wallet server may also verify the validity and monotonicity of KSN and independently compute K working ( 316 ). If everything is verified, the wallet server decrypts the encrypted track data and obtains TRACK ( 318 ).
  • the wallet server may also perform a check to ensure the data received is valid ( 320 ). For example, the wallet server may check that TRACK contains valid ISO-7812 strings.
  • both track 1 data and track 2 data should be present.
  • non-financial cards for example, gift cards
  • at least one of the tracks should be present.
  • the wallet server may also perform a longitudinal redundancy check (LRC) to check the correctness of the data.
  • LRC longitudinal redundancy check
  • the card holder name from the track 1 data should be consistent with the user's wallet account username on file, and the expiration date of the card should be valid (i.e. card not expired).
  • the wallet server re-encrypts TRACK using a key known to the MST (K MST ) ( 322 ) and sends back an AddCard (AC) token to the mobile communication device ( 324 ) over an SSL/TLS session.
  • the AC token may include the R MST , a server generated time-stamp (R S ), TRACK, and A* encrypted using K MST (for example, ⁇ R MST , R S , TRACK, A* ⁇ K MST ⁇ ).
  • the mobile communication device forwards the AC token to the MST ( 326 ) without interpretation.
  • the MST decrypts the AC token using K MST and verifies R MST for relevancy ( 328 ). If everything verifies, the MST deposits the TRACK and the add card operation is complete ( 330 ).
  • the use of point-to-point encryption and random nonce properly defends requirements on confidentiality, authenticity and freshness.
  • a method 400 for securely provisioning a static card from a card issuer is described with reference to FIG. 4 .
  • a card issuer may push card data over-the-air or via the network into the MST.
  • This method is similar to the static provisioning method described above, except that the card data (including the TRACK) originates from a card issuer server and is sent from the card issuer server to the wallet server, and then pushed securely into the MST.
  • the user initiates the process by nominating which issuer server to send a card request to.
  • the issuer server can notify the user when new cards are available to download. The user can then authenticate with the issuer server and download the actual card data.
  • the mobile communication device Upon a user request, the mobile communication device queries the MST the ID MST and session nonce R MST ( 402 ), and the MST sends the ID MST and R MST to the mobile communication device ( 404 ). With input from the user, the mobile communication device forwards this information to the wallet server, plus the user's credential (for example, ID MST , R MST , username, password) ( 406 ). The user may also input information (B*) for authenticating the user with the card issuer server (for example, the card issuer's identity and the user's online banking credential(s)). The wallet server sends B* to the card issuer server ( 408 ) to obtain the card data (including the TRACK). The wallet server then receives the TRACK from the card issuer server ( 410 ). The wallet server may interact with the card issuer server directly or through the provisioning and authentication server.
  • the card issuer server for example, ID MST , R MST , username, password
  • the user may also input information
  • the wallet server encrypts the TRACK using K MST , generates an AC token (for example, ⁇ R MST , R S , TRACK, A* ⁇ K MST ⁇ ), as described above, and sends the AC token to the mobile communication device ( 412 ).
  • the mobile communication device forwards the AC token to the MST ( 414 ).
  • the MST decrypts the AC token using K MST and verifies R MST for relevancy, and if everything verifies, the MST deposits the TRACK and the add card operation is complete ( 416 ).
  • a dynamic card that supports dCVV
  • a dynamic card may be provisioned into the MST and then transmitted to a POS.
  • a dCVV key K dCVV
  • K dCVV dCVV key
  • a method 500 for dynamically provisioning a card according to an illustrative embodiment is described with reference to FIG. 5 . Similar to the methods described above, the user may swipe a card to input the card data (including the TRACK) or the TRACK may be pushed to the MST by a card issuer server.
  • the user swipes a card (for example, a payment card or other type of card including magnetic card data) in to a swiper in the MST or a separate swiper accessory device coupled to the MST ( 502 ).
  • This provides card data (including the TRACK) to the MST.
  • the MST or separate MSR encrypts the TRACK data using a key (K working ) and sends the encrypted TRACK to the mobile communication device ( 504 ), which sends the encrypted TRACK to the wallet server ( 506 ).
  • the MST may also send additional information with the TRACK, for example, the MST may send the ID MST , R MST , username, password, KSN, and A* (i.e. auxiliary information that the wallet server uses to perform signature verification as well as for the card issuer server to perform authentication of the user/card holder) along with the encrypted TRACK.
  • the wallet server authenticates the user using the username and password, and also checks to see if the ID MST is currently associated with the user's wallet account.
  • the wallet server may verify the validity and monotonicity of KSN.
  • the wallet server may also perform a check to ensure the data received is valid. For example, the wallet server may check that TRACK contains valid ISO-7812 strings.
  • TRACK contains valid ISO-7812 strings.
  • both track 1 data and track 2 data should be present.
  • non-financial cards for example, gift cards
  • the wallet server may also perform a longitudinal redundancy check (LRC) to check the correctness of the transmitted data.
  • LRC longitudinal redundancy check
  • the card holder name from the track 1 data should be consistent with the user's wallet account username on file, and the expiration date of the card should be valid (i.e. card not expired).
  • the wallet server may determine whether the card is eligible for dCVV by checking to see if the card's Permanent Account Number (PAN) is from a participating issuer based on a BIN (Bank Identification Number, first 6 digits of the PAN). If not, the static provisioning described above may take place. Assuming the card is eligible for dCVV, the wallet server sends a request for provisioning to the provisioning and authentication server ( 508 ).
  • the request may include the PAN and auxiliary information for the card issuer/card issuer server to authenticate the user, such as a CVV-2, name, date of birth, answer to a challenge question, and/or other information.
  • a user without a swiper device may connect with the card issuer server by providing online banking credentials, and request a download of a dCVV card from the card issuer server.
  • the card issuer server may also inform the wallet server that it is ready.
  • the provisioning and authentication server may identify that the request, from step 508 , is from the wallet server, and the wallet server is trustworthy. In one aspect, the provisioning and authentication server believes that the wallet server has authenticated the MST on its behalf In another aspect, the provisioning and authentication server may perform additional verification with the card issuer server, using A* ( 510 ). The card issuer server may optionally return, beside the verification result, some auxiliary information B*, such as PAN alias, embossing art, etc. ( 512 ).
  • the provisioning and authentication server generates a random key (K dCVV ) for the card ( 514 ), and inserts in its database a 3 -tuple of: ⁇ PAN, K dCVV , T stamp ⁇ , where T stamp is a time-stamp of the current time in universal time coordinated (UTC), or relative to a fixed time reference.
  • T stamp is a time-stamp of the current time in universal time coordinated (UTC), or relative to a fixed time reference.
  • the time-stamp may also contain a counter CC that increments at each MST transaction. The combination of time-stamp and counter is used to provide a freshness component for the dynamic transactions.
  • the provisioning and authentication server sends the K dCVV to the wallet server, optionally along with the auxiliary information B* ( 516 ).
  • the wallet server sends K dCVV and SYNC (where SYNC contains the time-stamp information, and is used to synchronize time between the MST and the wallet server) to the mobile communication device ( 518 ), which then forwards K dCVV and SYNC to the MST ( 520 ).
  • K dCVV and SYNC may be signed to provide security.
  • the wallet server may also send some additional information to the MST, via the mobile communication device, along with K dCVV ; for example, the wallet server may also send TRACK.
  • the SYNC may be a packet that is used by the MST to adjust its internal reference of time. This allows the MST to provide an accurate time-stamp.
  • the MST transmits the time-stamp plus a cryptogram which is generated using the K dCVV , PAN, EXP, and the time-stamp. Since the time-stamp is synchronized, the server that performs authorization can check for packet freshness and verify the cryptogram. The use of time-stamp serves to prevent replay type attacks because the cryptogram generation is time-stamped, and any delay in consuming the cryptogram risks it being rejected by the authorization logic on server.
  • the provisioning and authentication server receives the TRACK from the card issuer server and sends TRACK to the wallet server along with K dCVV , and optionally B*.
  • the rest of the process is similar to the process described above.
  • the wallet server encrypts TRACK and K dCVV using K MST , generates an AC token (for example, ⁇ R MST , R S , TRACK, K dCVV , B* ⁇ K MST ⁇ ), and sends the AC token to the MST via the mobile communication device.
  • card data for example, including the TRACK
  • card data may be provisioned securely from the card issuer server (or a processor on behalf of a card issuer) to a MST of an account holder, without revealing the content of data outside of the account holder, for example when a card issuer or its processor wants to provision to the wallet application or their own mobile banking application without going through the wallet server.
  • a method 600 for provisioning a dCVV card according to an illustrative embodiment is described with reference to FIG. 6 .
  • the user i.e., a user having an account with the card issuer
  • authenticates with the card issuer server for example, by receiving and sending user account data (e.g., the user's online banking login and password) from the mobile communication device to the card issuer server.
  • the card issuer server validates the user using the user account data ( 604 ).
  • the card issuer server then notifies the provisioning and authentication server of the user's account information ( 606 ), for example, including, but not limited to a PAN, card holder name, as well as an “authorization string” to authenticate and identify the user and account, and an identifier assigned to the card issuer (“ID I ”).
  • ID I an identifier assigned to the card issuer
  • the provisioning and authentication server stores the authorization string, ID I , and user's account information ( 608 ).
  • the user's account information may include a working key generated by the provisioning and authentication server, and/or an embossing file in the case of static card provisioning.
  • the DD may include a hash of the card data, a name of the account holder if this is a card embossing file, and a time-stamp of generation of this DD.
  • a signature of the DD may also be returned with the data.
  • the signature may be signed by the card issuer or a card processor's working private key, and must be openly verifiable using a corresponding public certificate.
  • the mobile communication device then performs a handshake with the MST ( 618 ) and the MST sends the ID MST and R MST to the mobile communication device ( 620 ).
  • the mobile communication device sends this information along with additional information (for example, ID MST , R MST , DD, and the signature of DD) to the wallet server and requests permission ( 622 ). Note, the actual data is not sent to the wallet server in this case.
  • the wallet server performs one or more validations ( 624 ), for example, to verify the signature to ensure the signature corresponds to DD and comes from a card issuer that the wallet server recognizes and is authorized, as well as other auxiliary checks, such as to ensure the name in DD matches the wallet account name; and that the time-stamp for DD generation is current. If everything validates or check out, the wallet server retrieves the K MST corresponding to ID MST , and generates a permission cryptogram, including ⁇ DD, R MST ⁇ K MST . The wallet server returns this permission to the mobile communication device ( 626 ). The mobile communication device injects the card data, ID I and the permission into the MST ( 628 ).
  • the MST decrypts the permission using K MST and obtains DD and R MST , and validates the card data with DD ( 630 ).
  • the MST knows R MST is fresh so there is no replay attack. Successful decryption also suggests that the permission came from the wallet server.
  • the MST then independently computes a hash of the data and compares it to the corresponding portion of DD. If the two matches, the MST proceeds and installs the data.
  • the data may include, for example, the TRACK.
  • the wallet server does not have access to the card data throughout the provisioning process. The wallet server merely provides permission to the digest of the data.
  • FIG. 6 is described with respect to performing card provisioning without going through the wallet server, the card issuer serve may communicate with the wallet server to perform card provisioning and the provisioning and authentication sever may handle the authentication. It should also be appreciated that there are numerous ways in which the various servers may communicate with each other to perform card provisioning and authentication.
  • users may authenticate with a card issuer and initiate download of cards directly from card issuers. If the card is from a participating issuer that has the capabilities to authenticate dynamic cards, either by themselves or by their payment network, the wallet server may automatically initiate a conversion of the static track data into a dynamic card via the provisioning and authentication server.
  • a method 700 for provisioning a dCVV card according to an illustrative embodiment is described with reference to FIG. 7 .
  • the user i.e., a user having an account with the card issuer
  • the mobile communication device sends authentication information (for example, ID MST , R MST , username, password, and A* (where A* includes information, such as, an issuer account credential based on the issuer's authentication requirements)) to the wallet server ( 702 ).
  • the wallet server forwards the authentication information (for example A*) to the card issuer server for verification ( 704 ).
  • the card issuer server performs a validation and sends back to the wallet server the TRACK for the card and any other information required for presentation (for example, TRACK and C* (where C* may include a logo, image and/or other artwork) ( 706 ).
  • the wallet server checks and determines whether the card issuer is registered and/or participates in dynamic card authentication ( 708 ). If the card issuer does not, then the process proceeds win accordance with static card provisioning, as described above. If the card issuer does participate in dynamic card authentication, the wallet server sends a request for provisioning to the provisioning and authentication server ( 710 ).
  • the request may include the PAN and auxiliary information, such as a CVV-2, name, date of birth, answer to a challenge question, and/or other information.
  • the wallet server retrieves the MST's K MST from ID MST , and sends K dCVV and SYNC (where SYNC contains the time-stamp information, and is used to synchronize time between the MST and the wallet server) to the mobile communication device ( 716 ), which forwards K dCVV and SYNC to the MST ( 718 ).
  • K dCVV and SYNC may be encrypted or signed using K MST to provide security.
  • the wallet server may also send some additional information to the MST, via the mobile communication device, along with K dCVV ; for example, the wallet server may also send TRACK, R MST , R S , B*, where B* is some auxiliary information from the card issuer.
  • the MST may be used to transmit the card data at a POS to effect a transaction.
  • the data may be dynamically generated to provide security to the data being transmitted.
  • a method 800 for performing dCVV is described with reference to FIG. 8 .
  • the sequence of steps of transmission and verification by the card issuer server include the MST sending modified card data with dCVV to a POS terminal ( 802 ), which forwards the modified card data to an acquirer server ( 804 ), which then forwards the modified card data to the card issuer server ( 806 ).
  • the payload of the transmission may include: a start sentinel (SS), PAN, field separator (FS), EXP, SVC, T stamp , dCVV, MI, end sentinel (ES), and an error checksum character (LRC).
  • the MI may be a flag for the card issuer server to recognize and perform authorization in the dCVV mode. However, the MI may not be used if a future EXP is used as such an indicator, as described in further detail below.
  • the card issuer server may understand the transmission is a dCVV transaction based on the MI or future EXP. It should also be appreciated that a PAN can also be registered by a provisioning and authentication server to do a match during transaction so that a PAN registered may be checked against the provisioning and authentication server for authentication of the dCVV.
  • the card issuer server may request the provisioning and authentication server for verification of dCVV ( 808 ).
  • the provisioning and authentication server then returns an authentication or an authorization failure ( 810 ). If the PAN is not found, the provisioning and authentication server returns a PAN not registered error.
  • the provisioning and authentication server compares the T stamp received with the time that is currently on the server.
  • the comparison algorithm may be performed as follows: if the T stamp received is later in time than the T stamp stored, the time stamp is ok; if the T stamp received is earlier in time than the T stamp stored, the time stamp is incorrect and returns an authorization failure; if the T stamp received matches the T stamp stored return an authorization failure is returned the counter value received is less than the counter value stored, otherwise the time stamp is ok.
  • the provisioning and authentication server independently computes dCVV with K dCVV stored on the provisioning and authentication server and checks to see if the computed value is identical to the dCVV received. If the computed dCVV matches the dCVV received and the T stamp is ok, the provisioning and authentication server updates the T stamp currently stored with the T stamp it received. The provisioning and authentication server then returns an authentication or an authorization failure ( 810 ). If the computed value is not identical to the dCVV received, the provisioning and authentication server returns an authorization failure.
  • the card issuer server may also perform one or more routine checks that the card issuer server usually conducts when authorizing a regular card ( 812 ) and returns a final authorization result to the acquirer server ( 814 ), which forwards the message to the POS ( 816 ). If a failure is returned to the POS, the transaction may be cancelled. If final authorization is returned to the POS, the transaction may proceed.
  • a payment network for example, VISA
  • a third party processor server may handle the dCVV and authorize the transaction.
  • FIG. 9 illustrates such a method 900 for performing dCVV according to an illustrative embodiment.
  • the modified track data containing the dCVV is sent from the MST to the POS terminal ( 902 ), which forwards the modified card data to the acquirer server ( 904 ), which then forwards the modified card data to a payment network, such as a server operated by VISA ( 906 ), if applicable.
  • the acquirer server sends the transaction directly to the card issuer or processor server bypassing the payment network (known as an “on us” transaction), for these cases the provisioning authentication server would be hosted at the card issuer or processor server instead.
  • the dCVV may include a 3 digit code that is computed as a function of K dCVV , including the PAN, expiration date of the card (EXP), service code (SVC), and T stamp .
  • EXP expiration date of the card
  • SVC service code
  • T stamp T stamp
  • the counter value stored in the MST within the current time unit interval i.e. 10 min, 1 hour, etc.
  • the payment network checks whether the data corresponds to a dynamic card ( 908 ), for example, by checking for the MI or a modified EXP value.
  • a dynamic card 908
  • replacing a current EXP with fixed date in the future for example, December 2048
  • the payment network can proceed with dCVV validation.
  • the EXP is used as a MI, there is no need to allocate an additional digit for MI and the original, true EXP on the physical card issued can be protected because it is not transmitted.
  • the payment network When the payment network recognizes the data as dynamic, the payment network requests the provisioning and authentication server for verification of the dCVV ( 910 ), for example, using the PAN. If the PAN is not found within the provisioning and authentication server, an authorization failure is returned to the POS.
  • the provisioning and authentication server verifies the card ( 912 ). To perform this verification, the provisioning and authentication server may check to see if the T stamp received from the transaction is recent based on its own server time, i.e., that it is not a replay of an old transaction. For example, the provisioning and authentication server compares the T stamp it received from the transaction with the T stamp it last saw under the same card.
  • the time stamp is ok; if the T stamp received is less (earlier in time) than the T stamp stored, the time stamp is incorrect, an authorization failure is returned; and if the T stamp received is equal to the T stamp stored, an authorization failure is returned when CC Received is less than CC Stored , otherwise the time stamp is ok.
  • the provisioning and authentication server updates the T stamp currently stored with the T stamp it received, and in the last case, CC Stored is i incremented by one.
  • the provisioning and authentication server independently computes the dCVV using the K dCVV stored, and checks to see if the computed value matches the one received. If not, an authorization failure is returned. If the dCVV cryptogram is both valid and freshly generated, the provisioning and authentication server performs a process of restore. This process removes the dynamic components of the track data, such as, SVC, T Stamp and dCVV, and inserts the original track content at the corresponding locations inside the track. This process completely restores the original track data (TRACK) as issued by the card issuer. The provisioning and authentication server then sends the restored TRACK to the payment network ( 914 ).
  • TRACK original track data
  • the payment network may also forward the TRACK to the card issuer server for verification ( 916 ), which verifies the TRACK and sends a verification or an authorization failure back to the payment network ( 918 ).
  • the payment network then sends the authorization of payment or an authorization failure to the acquirer server ( 920 ), which forwards the authorization of payment or authorization failure to the POS ( 922 ).
  • the payment network may communicate with the third party processor to verify the TRACK. Additionally, in come embodiments, the card issuer server or the third party processor may communicate directly with the provisioning and authentication server to verify the dCVV and process the transaction.
  • the user may utilize the dCVV and/or modified EXP date in a CNP transaction, for example, when filling out an online payment form.
  • the wallet application on the mobile communication device may calculate or cause the MST to calculate the dCVV and/or modified EXP and display one or more of these to the user.
  • the user may then input the dCVV and/or modified EXP into an online transaction form and send the modified track data, including the dCVV and/or modified EXP, to an ecommerce server ( 924 ), the ecommerce server may then forward the modified track data to the acquirer server ( 926 ).
  • the authorization may then proceed as described above with reference to steps 906 - 920 .
  • Another way to indicate card data as a dCVV track transmission is to use a modified EXP value.
  • EXP value As an example, replacing the card's current EXP with a fixed value, for example, ‘4812’ (December-2048).
  • the card issuer server can proceed under the dCVV mode.
  • the dCVV occupies 6 digits.
  • this disclosure also relates to devices, systems, and methods that obscure and reuse the EXP in transactions or card systems. Replacing the EXP with a number equivalent to a date far into the future obscures the EXP in the transaction while providing the card issuer with a convenient flag to recognize the card as being dynamic.
  • an unauthorized person tries to use this EXP for an online purchase, it would be declined by the card issuer server, unless it is accompanied by a CVV-2 that is also dynamically generated by a MST, or by remote means from a Token Service Provider (TSP) (for example, the provisioning and authentication server) or a card issuer server, displayed to the cardholder on his/her mobile device at time of transaction request and would change on each new request by user, and expires after a short time.
  • TSP Token Service Provider
  • This dynamic CVV-2 can then be authenticated in the provisioning authentication server run by the card issuer server or TSP.
  • card issuers/card issuer servers provide a more secure transaction method for their card holders not only for physical card payments using existing POS infrastructure, but also for online or CNP card payments also using the existing CNP payment infrastructure without changing the merchants' online checkout systems. It is a fast solution to improve online payment security without waiting for massive merchant change.
  • the card issuers/card issuer servers do not have to replace these mobile single use cards in the field.
  • the EXP printed on the front of the physical plastic card that issuers do send in the mail, or static cards shown in an electronic wallet can remain with the original EXP for the purpose of online shopping with consumers' plastic cards the traditional way.
  • the card issuer/card issuer server and the network would be able to distinguish this as being a standard static card and process it accordingly.
  • the EXP on the magnetic stripe, in a magnetic stripe transmission (MST) or smart card (such as, an EMV card) message may be replaced by a specific number that represents a date far in the future.
  • the EXP may be replaced with a number 4912.
  • the retail system would interpret this number as a future date (December, 2049) while the card issuer/card issuer server would recognize 4912 as an indicator for a dCVV card and switch or process it accordingly.
  • FIG. 10 illustrates how the track 2 data is modified according to an aspect of the disclosure. This merely illustrates the concept of a dCVV track format.
  • the track 1 dCVV format is similar, but with an added field, such as, a card holder name and its field separators.
  • a Dynamic Mode Indicator (DMI or just MI) 1000 may be used to replace the card EXP 1002 .
  • the DMI 1000 is a 4 digit long number that replaces the card EXP 1002 and is set far in the future.
  • POS systems and acquirers read the DMI 1000 as an expiry data, but the card issuers/card issuer servers recognize the number as an indicator of the dynamic or token mode.
  • the Pin Verification Key Indicator (PVKI)/discretionary data 1004 may be modified or replaced with dynamic data or a token 1006 .
  • the dynamic data 1006 typically contains of two parts: the time-stamp (or in a counter-based variant, a 7 digit monotonically increasing number), and the dCVV which is a 3 digit to 6 digit numeric string computed using a one-way-keyed-hash function over SS, PAN, DMI and SVC.
  • the MST may be configured to adjust its internal reference of time, for example, to Jan/1/2014 15:00. This allows the MST to provide an accurate time-stamp.
  • the MST transmits the time-stamp plus a cryptogram which is generated using the K dCVV , PAN, EXP, and the time-stamp (the time-stamp+cryptogram is 1006 ).
  • time-stamp Since the time-stamp is synchronized, as described above, the server that performs authorization can check for packet freshness and verify the cryptogram.
  • the use of time-stamp serves to prevent replay type attacks because the cryptogram generation is time-stamped, and any delay in consuming the cryptogram risks it being rejected by the authorization logic on server.
  • FIG. 11 illustrates a block flow diagram of a method 1100 of dCVV for online e-commerce transactions.
  • the user authenticates with the card issuer server and a card is provisioned into the MST that supports dynamic CVV, illustrated as block 1102 , as described above.
  • the card issuer server and/or payment network records, in the provisioning and authentication server, that the provisioned card supports dCVV mode for online e-commerce transactions only or for both e-commerce and physical swipe at POS transactions, illustrated as block 1104 .
  • the PAN (or hash of the PAN) may be used as an identifier in the provisioning and authentication server, a K dCVV may also be issued and securely delivered to the MST.
  • a user may then use the card at checkout at an online e-commerce website.
  • the user may cause the mobile communication device to display the 16 digit PAN and EXP for the provisioned card via the wallet application, illustrated as block 1106 .
  • the user may then enter the PAN and EXP into an online e-commerce website at checkout, illustrated as block 1108 .
  • the wallet application working with the MST calculates and displays a dynamically generated CVV-2 for the user to enter into the online e-commerce website, illustrated as block 1110 .
  • the EXP can be the real EXP of the card or a modified future EXP for use as a mode indicator.
  • the provisioning and authentication server authorizes the transaction based on dCVV because it knows, based on the PAN, that the card is registered under dCVV for e-commerce transactions.
  • this provides a blurring effect that hides the true EXP; and an additional insurance that the card should be authorized under dCVV.
  • the CVV-2 may be calculated by the wallet application and MST based on the PAN, real EXP, SVC and the current time-stamp. Since the time-stamp is implicitly and universally synchronized, as described above, the authorization server (for example, the card issuer server or provisioning and authentication server) does not need to be informed of the time-stamp that the CVV-2 was based on.
  • the CVV-2 here may be a deterministic function of the cryptogram described above and generated in a substantially similar way.
  • the cryptogram may also be digitized using a digitization function. For example, by taking the first three character from the cryptogram and performing a modulo operation on every character, for example, by 10, to obtain the 3-digit CVV-2.
  • the user enters the dynamically generated CVV-2 into the online e-commerce website, illustrated as block 1112 .
  • the authorization server (for example, the card issuer server, the payment network, or provisioning and authentication server) receives the PAN, EXP, Name, and CVV-2 and checks its current time-stamp, and independently computes CVV-2 using the same algorithm, illustrated as block 1114 .
  • the computed CVV-2 is compared with the CVV-2 entered by the user, illustrated as block 1116 , to authorize the transaction if they match, illustrated as block 1118 , or reject the transaction if they do not match, illustrated as block 1120 .
  • the authorization server (for example, the card issuer server, the payment network, or provisioning and authentication server) may also tolerate +/ ⁇ X time-stamp where X is configurable.
  • the card issuer may allow the transaction to go through without the CVV2.
  • a CVV2 may not be required for a recurring payment and when there is an indication that the merchant is using the card data for recurring payment purposes the card issuer may allow the transaction to proceed.
  • the EXP is dynamic, when the EXP is reused during a normal transaction the transaction may fail.
  • the card issuer may choose to allow the transaction to continue because a previously valid transaction was successfully completed, otherwise the card issuer may decline the transaction.
  • card issuers may rely on the PAN to issue a refund relating to a particular transaction in their own system.
  • the MST 102 can be used to interact with a merchant point of sale (POS) by transmitting card data from a magnetic field transmitter to a magnetic stripe reader (MSR) of the merchant POS and used in e-commerce transactions as described above. As illustrated in FIG.
  • POS point of sale
  • MSR magnetic stripe reader
  • the MST 102 may include a microprocessor 1202 , a light-emitting diode (LED) indicator 1204 , a power source 1206 , optionally a magnetic stripe reader (MSR) 1208 , a memory storage component or secure element 1210 , an input/output interface 1212 (for example, a 3.5 mm or other standard audio port, a USB port/jack interface or other communication interface, including but not limited to a 30 pin or 9 pin Apple interface, a Bluetooth interface, and other serial interfaces), and a magnetic field transmitter 1214 which includes a driver and an inductor for transmitting magnetic pulses to be received by any POS device with a MSR, such as the POS 120 .
  • MSR magnetic stripe reader
  • Microprocessor 1202 handles security and communications with the mobile communication device 104 .
  • the microprocessor 1202 can also transmit and receive encrypted card data to and from the secure element 1210 .
  • the magnetic field transmitter 1214 transmits magnetic stripe data of a cardholder to the POS device 120 by transmitting magnetic impulses to the MSR of the POS device 120 .
  • the MST 102 may also be used for reading other magnetic stripe cards by using the optional MSR 1208 .
  • the MSR 1208 may be used for loading payment card data onto the secure element 1210 and for capturing card track data.
  • the mobile communication device 104 includes the wallet application, and may also include a display with key pad or touchpad display and a central processing unit (CPU).
  • the wallet application initializes and unlocks the MST 102 , interacts with the MST 102 and accepts card payment data from the MST 102 .
  • the mobile communication device 104 may also interact with the MST 102 to display a CVV-2 for the user to enter into an online e-commerce transaction using dCVV.
  • the card data may be encrypted, and the encrypted data may be transmitted to the mobile communication device 104 .
  • the wallet application may transmit the data to the server.
  • the data may be decrypted at the server and the primary account number (PAN) data, card number, expiration and name of the cardholder is stripped from the track data.
  • PAN primary account number
  • the wallet application or the server may also make a determination as to whether the magnetic card is a payment card or a non-payment card. If the magnetic card is a non-payment card the MST 102 can automatically store the card data in the memory for non-payment transmission. If the magnetic card is a payment card, for example, having a specific format recognizable to the system, the card may be detected as a payment card and the system determines if the name on the payment card matches the name of the user account.
  • the system may determine if the PAN number matches an existing card already stored on the server, to either create a new account or leave the existing one. If a new card is created, the system may store the card data in a payment section of MST's secure memory encrypted.
  • the MST 102 has the ability to load any type of magnetic stripe card into the memory means, not just payment cards.
  • Non-payment cards may be stored separately with less security for convenience.
  • some non-payment applications may include cards to open doors, loyalty cards, etc.
  • the loading of payment data vs. non-payment data may be separated into two separate fields or storage areas.
  • payment cards may not be loaded into non-payment storage.
  • payment data may have a specific format that can be detected and may not be allowed to be loaded into the non-payment storage area.
  • the payment cards may also require authentication with the application before being transmitted. On the other hand, default non-payment data may be transmitted without authentication.
  • the devices, systems, and methods disclosed herein provide for the card data to be captured and stored in the MST's secure memory means directly by the user without modification, and to be used later with a POS or other MSR device.
  • the unique connection or registering of a MST to a user account such that the MST can be only used with that account for card data storage and transmission use provides security.
  • the MST is capable of connecting to mobile communication devices via different interfaces beyond audio jack and USB connections (such as Bluetooth, and other wireless communication interfaces).
  • the devices, systems, and methods allow for the loading of encrypted card data into the memory means of the MST that can later be decrypted and transmitted to the POS, or can be transmitted encrypted to the mobile communication device and then routed to the payment server for decryption and processing for loading a user account on the server or processing a POS transaction.
  • the devices, systems, and methods provide for the ability to use the stored card data or swiped card data for virtual checkout environments for a more secure and lower cost transaction for merchants.
  • the devices, systems, and methods provide for the remote loading and transmission of card data from a card issuer to the wallet server provider, to the wallet application on the mobile communication device, and to the SE or memory means of the MST for later use.
  • the devices, systems, and methods also provide for the ability to load loyalty account information along with the payment card data into one or more discretionary fields of the card data to be read by the issuer during or after a transaction, which can lead to offers and loyalty programs combined with a payment transaction.
  • the devices, systems, and methods disclosed herein can include, and may be implemented within, a number of different devices and computer systems, including, for example, general-purpose computing systems, POS systems, server-client computing systems, mainframe computing systems, a cloud computing infrastructure, telephone computing systems, laptop computers, desktop computers, smart phones, cellular phones, personal digital assistants (PDAs), tablet computers, and other mobile devices.
  • the devices and computing systems may have one or more databases and other storage apparatuses, servers, and additional components, for example, processors, modems, terminals and displays, input/output devices, computer-readable media, algorithms, modules, and other computer-related components.
  • the devices and computer systems and/or computing infrastructures are configured, programmed, and adapted to perform the functions and processes of the systems and methods as disclosed herein.
  • Communications between components in the devices, systems, and methods disclosed herein may be unidirectional or bidirectional electronic communication through a wired or wireless configuration or network.
  • one component may be wired or networked wirelessly directly or indirectly, through a third party intermediary, over the Internet, or otherwise with another component to enable communication between the components.
  • wireless communications include, but are not limited to, radio frequency (RF), infrared, Bluetooth, wireless local area network (WLAN) (such as WiFi), or wireless network radio, such as a radio capable of communication with a wireless communication network such as a Long Term Evolution (LTE) network, WiMAX network, 3G network, 4G network, and other communication networks of the type.
  • LTE Long Term Evolution
  • WiMAX Worldwide Interoperability for Microwave Access
  • the methods disclosed herein may be performed in different forms of software, firmware, and/or hardware.
  • the methods disclosed herein may be performed on a single device or may be performed on multiple devices.
  • program modules including one or more components may be located in different devices and may each perform one or more aspects of the present disclosure.

Abstract

Devices, systems, and methods for securely converting a user's existing static payment card data into dynamic card data that can be authenticated by card issuers or by a stand-in service provider, such as a payment network or processor without requiring the card issuers to make infrastructure changes. The dynamic data can be provisioned onto a magnetic secure transmission device (MST) either directly from a card issuer or using a swiper type device. Devices, systems, and methods are also disclosed for securely provisioning a dynamic card onto the MST by the card issuer. These dynamic cards may be used to transmit modified one-time-use card track data from the MST to a point of sale using a dynamic-CVV methodology to provide higher levels of security during a transaction.

Description

    CROSS REFERENCES TO RELATED APPLICATIONS
  • This application claims the benefit of U.S. Provisional Patent Application Ser. No. 61/974,696, filed Apr. 3, 2014, which is incorporated herein by reference in its entirety.
  • FIELD
  • The present disclosure relates to magnetic stripe data storage and secure transmission thereof.
  • BACKGROUND
  • Transmission of magnetic stripe data has been done primarily by swiping a magnetic stripe card against a magnetic stripe reader (MSR) to enable payment, identification (ID), and access control functions. Mobile wallet applications on smartphones and tablets have had difficulty interacting with existing merchant point of sale (POS) devices or other devices with MSRs. Contactless reader enabled POS terminals (typically using, for example, an ISO-14443 standard) are not ubiquitous to accept contactless or near field communications (NFC) payments. It would be expensive and would take time to replace the millions of merchant POS devices (or door locks) that only accept magnetic stripe cards, just to interact with NFC phones or other transmission means like barcodes.
  • Additionally, financial payment cards contain a card number, called the Primary Account Number or PAN, whose purpose is to identify the account the payment is made against. Cards also carry an Expiry Date, which indicates when the card expires. Most cards also carry in the magnetic stripe data a cryptographically generated Card Validation Value (also known as a CVV1), which prevents a valid card to be created from its PAN and Expiry Date information. Typically, cards are replaced after about 2 to 3 years, as the magnetic stripe gets worn out and issuers do not want a card to be active indefinitely.
  • Today the PAN is used not only to identify the account, but also to authorize charges in Card-Not-Present (CNP) transactions (as opposed to Card-Present (CP) transactions in which the card is physically swiped at a POS terminal), the vast majority of these being Internet transactions, but also include telephone orders and mail orders. The simple knowledge of the PAN, an Expiry Date, and the name on the card is sufficient to charge CNP purchases against the account. A CVV-2, as known in the art, is a 3- or 4-digit value printed on the card or signature strip, but not encoded on the magnetic stripe, to verify that the customer has the card in his/her possession. While a large percentage of e-commerce sites also require a CVV-2 for transactions, many do not.
  • The PAN and Expiry Date are hard to keep secret: they are printed on the front of the card and are contained in the magnetic stripe data or chip data of the card. During the POS transaction the magnetic stripe or the chip is read by the terminal and its data (including the PAN, expiry date, and CVV2) is transmitted through the retailer's system to the acquirer and then to the card issuer. The PAN, and to a lesser extent the Expiry Date, are used for a number of functions by retailer systems and cannot be obscured.
  • The magnetic stripe or chip card data is the target of data theft, either in transit or when in memory. Being static, the magnetic stripe data is subject to interception and copying, and a number of attacks. Stolen data, from which the PAN and Expiry Date can be easily extracted, can be used in fraudulent CNP transactions. A physical card can be skimmed by reading the magnetic stripe data on the card, or putting a reading device proximate to retailer POS terminals to capture magnetic stripe track data including the PAN and Expiry Date and the name on the card. A sniffing device can also be used to pick up track data from contactless cards in purses and wallets of unsuspecting shoppers at a retail establishment. Malware in a retailers POS system can also be used to capture the card data in route to the payment processor. Such stolen data may contain the PAN and the Expiry Date, both in magnetic stripe and smart card (for example, an Europay, MasterCard and Visa (EMV) card) transactions and can be used for CNP fraud. Additionally, captured magnetic stripe data also includes the CVV1, while captured online card data can include the CVV2. The key weakness of both CVV1 and CVV2 is that they are static: once learned they can be used in fraudulent transactions.
  • SUMMARY
  • The present disclosure relates to devices, systems, and methods involving a magnetic stripe storage and transmission device (also referred to as a MST (magnetic secure transmission) device) for use in conjunction with a mobile wallet application and platform to capture, store and transmit magnetic stripe card data to merchants' conventional point of sale (POS) terminals and other devices with magnetic stripe readers (MSRs) or online checkout systems, in physical and virtual environments.
  • The present disclosure also relates to devices, systems, and methods for converting static card data (for example, the CVV1 or CVV2) into dynamic cryptograms that can only be used one time, and cannot be replayed by fraudsters, and leveraging mobile devices to deliver payment information that includes the cryptograms back to the card issuer for authentication, without changing the existing merchant acceptance infrastructure whether it is for physical payment via POS or remote payment via online checkout. The devices, systems, and methods allow users to automatically convert the static card data into dynamic one time use card data that can be authenticated by the payment network or processor on behalf of the thousands of card issuers as a service, without infrastructure change and integration by each issuer.
  • In an aspect, a dynamic cryptogram which can be called a dynamic-CVV (dCVV) is used to secure card payments. A dCVV is generated freshly with a key plus primary account number (PAN), expiration or expiry date (EXP), timestamp and counter, when the card is used for payment in both Card-Not-Present (CNP) and Card-Present (CP) transactions. The dCVV, which is cryptographically generated, cannot be generated without the knowledge of the card data and a secret key. Also, each dCVV is only valid for a short period of time. This prevents the replaying attack described above, since re-use of the dCVV from a previously monitored transaction will result in an authorization error.
  • In another aspect, the card issuer or a stand-in service provider may differentiate CP transactions that use dCVV technology, because the validation algorithm used is different for dCVV transaction as opposed to ordinary magnetic stripe CP transactions. The dCVV transactions may be identified by replacing the EXP of the card data with a number equivalent to a date far into the future recognizable by the issuer or service provider. This obscures the EXP in a payment transaction while providing the card issuer with a convenient flag to recognize the card as being in dCVV mode. Other flags can be used to indicate the card is in dCVV mode, such as a flag in a discretionary field of the track data used to indicate dCVV mode. The PAN can also be registered in the issuer or service provider's database as a dCVV card.
  • The concept of dCVV in the domain of MST also naturally applies to CNP transactions. In CNP transactions, a dynamically generated 3 digit code (or 4 digit code in the case of American Express cards) retrieved from the mobile wallet application, is dynamically computed at the time of request, is entered into the checkout web site or application. The masked EXP also retrieved from the mobile wallet application, to be entered also uses a date far in the future indicating that this is a dCVV CNP transaction. This way both the original CVV-2 and EXP are hidden from an attacker monitoring the transaction. Moreover, intercepting a particular CNP transaction does not lead to an attacker using the information in another transaction, because the CVV code is computed in real-time and changes between CNP transactions, and is time stamped so that it would expire after a short time.
  • In order to convert existing static card data into dynamic card data for mobile users without requiring each card issuer to change their provisioning infrastructure, the devices, systems, and methods effectively allow cardholders to convert existing magnetic stripe card data into dynamic tokenized dynamic card data using mobile devices without requiring the card issuers to setup a separate remote mobile provisioning system. The card issuer, the issuer's processor, or the issuer's payment network may host the Provisioning Authentication Server (PAS) to authenticate the dCVV packaged in the MST transmission, or dCVV2 for online transactions, and either validate for the issuer the dynamic payment data is authentic, or validate and return the original track data (in the case of the payment network,) or original CVV2 back to the issuer or its processor so that the payment network can do the authentication service (or tokenization service) on behalf of the card issuer. This can dramatically speed up the conversion from static card data in the field to dynamic tokenized card data to enhance security for CP and CNP transactions.
  • BRIEF DESCRIPTION OF THE DRAWINGS
  • Embodiments of devices, systems, and methods are illustrated in the figures of the accompanying drawings which are meant to be exemplary and not limiting, in which like references are intended to refer to like or corresponding parts, and in which:
  • FIG. 1 is a functional diagram of an overview of a system according to aspects of the disclosure;
  • FIG. 2 is a flow diagram of a method of operation of initializing an MST according to aspects of the disclosure;
  • FIG. 3 is a flow diagram of a method of provisioning a static card based on a user swiping the card according to aspects of the disclosure;
  • FIG. 4 is a flow diagram of a method of provisioning a static card from a card issuer according to aspects of the disclosure;
  • FIG. 5 is a flow diagram of a method of dynamically provisioning a card according to aspects of the disclosure;
  • FIG. 6 is a flow diagram of a method of provisioning a card according to aspects of the disclosure;
  • FIG. 7 is a flow diagram of a method of provisioning a dynamic card according to aspects of the disclosure;
  • FIG. 8 is a flow diagram of a method of performing dynamic-CVV (dCVV) according to aspects of the disclosure;
  • FIG. 9 is a flow diagram of another method of performing dCVV according to aspects of the disclosure;
  • FIG. 10 is a diagram of modifying an expiration date of card data according to aspects of the disclosure;
  • FIG. 11 is a block flow diagram of a method of performing dCVV for e-commerce transactions according to aspects of the disclosure; and
  • FIG. 12 is a functional block diagram of the MST according to aspects of the disclosure.
  • DETAILED DESCRIPTION
  • Detailed embodiments of devices, systems, and methods are disclosed herein, however, it is to be understood that the disclosed embodiments are merely exemplary of the devices, systems, and methods, which may be embodied in various forms. Therefore, specific functional details disclosed herein are not to be interpreted as limiting, but merely as a basis for the claims and as a representative basis for teaching one skilled in the art to variously employ the present disclosure.
  • In general, the present disclosure relates to leveraging magnetic stripe data storage and secure transmission devices to deliver secure cryptographic one time use payment data on existing payment acceptance infrastructure.
  • An overview of a system 100 involved in secure card provisioning and transmission according to an illustrative embodiment is described with reference to FIG. 1. The overall system 100 includes a MST 102, a mobile communication device 104, a wallet server 106, a provisioning and authentication server 108, a card issuer server 110, an acquirer server 112, a point of sale (POS) 120, a payment network server 122, a processor server 124 (e.g., a third party processor server of the issuer), and an encrypted magnetic stripe reader 126 (MSR) which can be part of the MST 102 (as illustrated in FIG. 12) or work alone with a wallet application on the mobile communication device 104. The MST 102 interfaces with the mobile communication device 104 or may be embedded in the mobile communication device 104, and the mobile communication device 104 communicates with the wallet server 106, provisioning and authentication server 108, card issuer server 110, and acquirer server 112 via a network 114. Each of the wallet server 106, provisioning and authentication server 108, card issuer server 110, acquirer server 112, payment network server 122, and processor server 124, may also communicate with one another via the network 114.
  • In an aspect, the wallet server 106 may include one or more databases 116 and user accounts 118. The one or more databases 116 may store association data of the MST 102 and the user accounts 118, and one or more keys used by the MST 102 and/or the wallet server 106. The MST 102 may be registered with a user account 118, as described in further detail below.
  • It should also be appreciated that the provisioning and authentication server 108, the card issuer server 110, and the acquirer server 112 may also include one or more databases and other components, such as, software and/or hardware to allow for the methods disclosed herein to be performed.
  • As illustrated, the MST 102 may be a dongle that may be connected to and disconnected from the mobile communication device 104. The MST 102 may communicate with the mobile communication device 104 through an audio port and/or through other types of communication interfaces, for example including, but not limited to, a USB port, a 30 pin or 9 pin Apple interface, a Bluetooth interface, a near field communication (NFC), and other serial interfaces. While the MST 102 is illustrated as a dongle, the MST may be another type of peripheral device that communicates with the mobile communication device 104 through a contactless interface, such as Bluetooth or NFC; or the MST 102 may be embedded inside of the mobile communication device 104 as part of mobile communication device 104.
  • In an aspect, a user may set up the user account 118 on the wallet server 106, for example, by downloading and/or installing a wallet application on the mobile communication device 104. The wallet application 104 may be an interface for a user to view a list of cards available for Card-Not-Present (CNP) and Card-Present (CP) transactions. In an aspect, the user may choose or select a card and transmit card data corresponding to the card (for example, card track data) using the MST 102, in either a static or a dynamic-CVV (dCVV) mode. Similarly, when performing CNP transactions, the user may view a dynamically computed Expiry Date (EXP) and CVV-2 and use them to fill checkout web forms to perform a dCVV CNP transaction.
  • The user may also set up the user account 118 using a computer connected to the network 114 by accessing a user account web portal. To set up the user account 118, the user may specify a username, password and a personal PIN. The password may be used to login to the wallet application on the mobile communication device 104. Once the user is logged in, the personal PIN may be used to enter a payment card section of the wallet application, as well as to unlock the wallet application.
  • The user may optionally add the MST 102 to the user account 118 by specifying a globally unique identifier (GUID) of the MST 102 (also referred to herein as IDMST). The PIN (which only the user knows) is used to authenticate with the MST 102 to operate any card data stored on the MST 102. A copy of the PIN may also be stored on the wallet server 106 and used as described below. Operation of the MST 102 using the PIN-based authentication can be done with or without the mobile communication device 104 being connected to the wallet server 106 via the network 114. This allows the MST 102 to be operated to utilize the card data stored on the MST 102, even when no network connection exists.
  • The MST 102 can store magnetic stripe card data by either an initial load at manufacturing, loading via a wireless communication network after setting up the user account 118, and/or by the consumer loading his/her own card(s) data directly into the MST 102 using encrypted MSR prompted by the mobile wallet application. The MST 102 may transmit the magnetic stripe card data in both static (in which it transmits the original data without modification) and in dCVV mode (in which part of the data is dynamically computed each time during transmission). In general, the user is a person that has set up a user account, for example, on the wallet server 106 via a cloud computing infrastructure (such as via the network 114), and has initialized the wallet application on his/her mobile communication device 104.
  • A method 200 of initializing the MST 102, having a unique device ID, to a user account 118 according to an illustrative embodiment is described with reference to FIG. 2. An MST is initialized or registered for the first time to a user account by plugging in or connecting the MST to the mobile communication device, illustrated as block 202. Upon connecting the MST to the mobile communication device, the wallet application recognizes the MST and registers the MST with the user account of the user, illustrated as block 204. When the MST has been registered and connected to the appropriate user account, the MST and the user account may perform a handshake, illustrated as 206, and send and receive commands, illustrated as block 208.
  • Once the MST has been registered with the user account, the user can use the wallet application to load his/her cards by swiping the cards on a built in MSR of the MST or a separate MSR that may be connected to the MST or the mobile communication device. The card data may be digitized and encrypted, and stored in the MST for later use. For example, as illustrated in FIG. 1, the cards may be used by the MST 102 and sent to a point of sale (POS) 120 to effect a transaction. In this aspect, the POS may also communicate with one or more of the wallet server 106, provisioning and authentication server 108, card issuer server 110, and/or the acquirer server 112, via the network 114.
  • A method 300 for securely provisioning a static card based on a user swiping the card according to an illustrative embodiment is described with reference to FIG. 3. As used herein, “static” means that the same card data is transmitted to the POS each time when used. In this embodiment, the user may use a swiper device integrated into or coupled to the MST to load cards into the user's MST.
  • A user swipes a card (for example, a payment card or other type of card including magnetic card data) in to a swiper in the MST or a separate swiper accessory device coupled to the MST (302). This provides card data including card track data (i.e. data corresponding to the card) (“TRACK”) to the MST. The MST then encrypts the TRACK using a key (K working) (304) and sends the encrypted TRACK and a key serial number (KSN) (for example, a 10-byte KSN) to the mobile communication device (306). In an aspect, the KSN contains a monotonically increasing counter; therefore swiping the same card twice should yield two distinct pieces of cipher-text. The MST may also send some auxiliary information (A*) that may be used by the wallet server when the wallet server later performs a signature verification, as described below. In one example, the MST sends the following to the mobile communication device: {TRACK} Kworking, KSN, A*, where the brackets indicate an encryption function.
  • The mobile communication device queries the MST for its identifier (IDMST) and session nonce RMST (308). In response to the query, the MST sends the IDMST and RMST to the mobile communication device (310). The mobile communication device forwards this information (for example, IDMST, RMST, {TRACK} Kworking, KSN, A*) to the wallet server, plus the user's input credential(s) (for example, a username and password) for the wallet server to authenticate (312).
  • The wallet server authenticates the user using the username and password, and also checks to see if the IDMST is currently connected to the user's wallet account (314). The wallet server may also verify the validity and monotonicity of KSN and independently compute Kworking (316). If everything is verified, the wallet server decrypts the encrypted track data and obtains TRACK (318). The wallet server may also perform a check to ensure the data received is valid (320). For example, the wallet server may check that TRACK contains valid ISO-7812 strings. For financial cards, both track 1 data and track 2 data should be present. For non-financial cards, (for example, gift cards), at least one of the tracks should be present. The wallet server may also perform a longitudinal redundancy check (LRC) to check the correctness of the data. For financial cards, the card holder name from the track 1 data should be consistent with the user's wallet account username on file, and the expiration date of the card should be valid (i.e. card not expired).
  • If the wallet server is satisfied, the wallet server re-encrypts TRACK using a key known to the MST (KMST) (322) and sends back an AddCard (AC) token to the mobile communication device (324) over an SSL/TLS session. The AC token may include the RMST, a server generated time-stamp (RS), TRACK, and A* encrypted using KMST (for example, {RMST, RS, TRACK, A*}KMST}).
  • The mobile communication device forwards the AC token to the MST (326) without interpretation. The MST decrypts the AC token using KMST and verifies RMST for relevancy (328). If everything verifies, the MST deposits the TRACK and the add card operation is complete (330). The use of point-to-point encryption and random nonce properly defends requirements on confidentiality, authenticity and freshness.
  • A method 400 for securely provisioning a static card from a card issuer according to an illustrative embodiment is described with reference to FIG. 4. In this embodiment, a card issuer may push card data over-the-air or via the network into the MST. This method is similar to the static provisioning method described above, except that the card data (including the TRACK) originates from a card issuer server and is sent from the card issuer server to the wallet server, and then pushed securely into the MST. The user initiates the process by nominating which issuer server to send a card request to. After the initial setup, the issuer server can notify the user when new cards are available to download. The user can then authenticate with the issuer server and download the actual card data.
  • Upon a user request, the mobile communication device queries the MST the IDMST and session nonce RMST (402), and the MST sends the IDMST and RMST to the mobile communication device (404). With input from the user, the mobile communication device forwards this information to the wallet server, plus the user's credential (for example, IDMST, RMST, username, password) (406). The user may also input information (B*) for authenticating the user with the card issuer server (for example, the card issuer's identity and the user's online banking credential(s)). The wallet server sends B* to the card issuer server (408) to obtain the card data (including the TRACK). The wallet server then receives the TRACK from the card issuer server (410). The wallet server may interact with the card issuer server directly or through the provisioning and authentication server.
  • The wallet server encrypts the TRACK using KMST, generates an AC token (for example, {RMST, RS, TRACK, A*}KMST}), as described above, and sends the AC token to the mobile communication device (412). The mobile communication device forwards the AC token to the MST (414). As described above, the MST decrypts the AC token using KMST and verifies RMST for relevancy, and if everything verifies, the MST deposits the TRACK and the add card operation is complete (416).
  • In another aspect, a dynamic card (that supports dCVV) may be provisioned into the MST and then transmitted to a POS. In this aspect, a dCVV key (KdCVV) may be generated and sent to the MST by a card issuer server or sent to the card issuer server from the MST to facilitate dynamic provisioning. A method 500 for dynamically provisioning a card according to an illustrative embodiment is described with reference to FIG. 5. Similar to the methods described above, the user may swipe a card to input the card data (including the TRACK) or the TRACK may be pushed to the MST by a card issuer server.
  • In an aspect, the user swipes a card (for example, a payment card or other type of card including magnetic card data) in to a swiper in the MST or a separate swiper accessory device coupled to the MST (502). This provides card data (including the TRACK) to the MST. The MST or separate MSR encrypts the TRACK data using a key (Kworking) and sends the encrypted TRACK to the mobile communication device (504), which sends the encrypted TRACK to the wallet server (506). The MST may also send additional information with the TRACK, for example, the MST may send the IDMST, RMST, username, password, KSN, and A* (i.e. auxiliary information that the wallet server uses to perform signature verification as well as for the card issuer server to perform authentication of the user/card holder) along with the encrypted TRACK.
  • In a similar manner as described above, the wallet server authenticates the user using the username and password, and also checks to see if the IDMST is currently associated with the user's wallet account. The wallet server may verify the validity and monotonicity of KSN. The wallet server may also perform a check to ensure the data received is valid. For example, the wallet server may check that TRACK contains valid ISO-7812 strings. For financial cards, both track 1 data and track 2 data should be present. For non-financial cards, (for example, gift cards), at least one of the tracks should be present. The wallet server may also perform a longitudinal redundancy check (LRC) to check the correctness of the transmitted data. For financial cards, the card holder name from the track 1 data should be consistent with the user's wallet account username on file, and the expiration date of the card should be valid (i.e. card not expired).
  • In some instances, the wallet server may determine whether the card is eligible for dCVV by checking to see if the card's Permanent Account Number (PAN) is from a participating issuer based on a BIN (Bank Identification Number, first 6 digits of the PAN). If not, the static provisioning described above may take place. Assuming the card is eligible for dCVV, the wallet server sends a request for provisioning to the provisioning and authentication server (508). The request may include the PAN and auxiliary information for the card issuer/card issuer server to authenticate the user, such as a CVV-2, name, date of birth, answer to a challenge question, and/or other information.
  • It should be appreciated that the steps described above are merely one way of identifying the user and the card subject to dCVV to the card issuer and provisioning and authentication server(s). Other ways can be implemented. For example, a user without a swiper device may connect with the card issuer server by providing online banking credentials, and request a download of a dCVV card from the card issuer server. The card issuer server may also inform the wallet server that it is ready.
  • The provisioning and authentication server may identify that the request, from step 508, is from the wallet server, and the wallet server is trustworthy. In one aspect, the provisioning and authentication server believes that the wallet server has authenticated the MST on its behalf In another aspect, the provisioning and authentication server may perform additional verification with the card issuer server, using A* (510). The card issuer server may optionally return, beside the verification result, some auxiliary information B*, such as PAN alias, embossing art, etc. (512).
  • The provisioning and authentication server generates a random key (KdCVV) for the card (514), and inserts in its database a 3-tuple of: {PAN, KdCVV, Tstamp}, where Tstamp is a time-stamp of the current time in universal time coordinated (UTC), or relative to a fixed time reference. The time-stamp may also contain a counter CC that increments at each MST transaction. The combination of time-stamp and counter is used to provide a freshness component for the dynamic transactions.
  • The provisioning and authentication server sends the KdCVV to the wallet server, optionally along with the auxiliary information B* (516). The wallet server sends KdCVV and SYNC (where SYNC contains the time-stamp information, and is used to synchronize time between the MST and the wallet server) to the mobile communication device (518), which then forwards KdCVV and SYNC to the MST (520). KdCVV and SYNC may be signed to provide security. The wallet server may also send some additional information to the MST, via the mobile communication device, along with KdCVV; for example, the wallet server may also send TRACK.
  • The SYNC may be a packet that is used by the MST to adjust its internal reference of time. This allows the MST to provide an accurate time-stamp. When used, the MST transmits the time-stamp plus a cryptogram which is generated using the KdCVV, PAN, EXP, and the time-stamp. Since the time-stamp is synchronized, the server that performs authorization can check for packet freshness and verify the cryptogram. The use of time-stamp serves to prevent replay type attacks because the cryptogram generation is time-stamped, and any delay in consuming the cryptogram risks it being rejected by the authorization logic on server.
  • In the case where the card data (including the TRACK) is pushed over-the-air to the MST instead of being swiped into the MST by the user, the provisioning and authentication server receives the TRACK from the card issuer server and sends TRACK to the wallet server along with KdCVV, and optionally B*. The rest of the process is similar to the process described above. For example, the wallet server encrypts TRACK and KdCVV using KMST, generates an AC token (for example, {RMST, RS, TRACK, KdCVV, B*}KMST}), and sends the AC token to the MST via the mobile communication device.
  • Additionally, static card data, described above, may be converted to dynamic card data (dCVV) in accordance with the step of FIG. 5. For example, instead of swiping the card into the MST at step 502, the static card may be pulled from memory or storage and converted into a dynamic card in the same manner as steps 504-520. It should also be appreciated that the steps of 510 and 512 may be optional, and the provisioning and authentication server may simply convert the static card into a dynamic card without authentication of the user with the card issuer server.
  • In another aspect, card data, for example, including the TRACK, may be provisioned securely from the card issuer server (or a processor on behalf of a card issuer) to a MST of an account holder, without revealing the content of data outside of the account holder, for example when a card issuer or its processor wants to provision to the wallet application or their own mobile banking application without going through the wallet server. A method 600 for provisioning a dCVV card according to an illustrative embodiment is described with reference to FIG. 6.
  • As illustrated in FIG. 6, the user (i.e., a user having an account with the card issuer) authenticates with the card issuer server (602), for example, by receiving and sending user account data (e.g., the user's online banking login and password) from the mobile communication device to the card issuer server. The card issuer server validates the user using the user account data (604). The card issuer server then notifies the provisioning and authentication server of the user's account information (606), for example, including, but not limited to a PAN, card holder name, as well as an “authorization string” to authenticate and identify the user and account, and an identifier assigned to the card issuer (“IDI”). The provisioning and authentication server stores the authorization string, IDI, and user's account information (608). The user's account information may include a working key generated by the provisioning and authentication server, and/or an embossing file in the case of static card provisioning.
  • The provisioning and authentication server then informs the card issuer server that preparation for provisioning is compete (610). In response, the card issuer server informs the mobile communication device that preparation is complete, for example, by sending the authorization string and IDI to the mobile communication device (612). The mobile communication device uses the authorization string and IDI to request card data from the provisioning and authentication server by sending a request for data (614). The data will only be revealed to card issuer's account holder (i.e., the user having an account with the card issuer). In response to the request, the provisioning and authentication server returns the card data and optionally a digest of data referred to as “DD” (616). The DD may include a hash of the card data, a name of the account holder if this is a card embossing file, and a time-stamp of generation of this DD. In an aspect, a signature of the DD may also be returned with the data. The signature may be signed by the card issuer or a card processor's working private key, and must be openly verifiable using a corresponding public certificate.
  • The mobile communication device then performs a handshake with the MST (618) and the MST sends the IDMST and RMST to the mobile communication device (620). The mobile communication device sends this information along with additional information (for example, IDMST, RMST, DD, and the signature of DD) to the wallet server and requests permission (622). Note, the actual data is not sent to the wallet server in this case. The wallet server performs one or more validations (624), for example, to verify the signature to ensure the signature corresponds to DD and comes from a card issuer that the wallet server recognizes and is authorized, as well as other auxiliary checks, such as to ensure the name in DD matches the wallet account name; and that the time-stamp for DD generation is current. If everything validates or check out, the wallet server retrieves the KMST corresponding to IDMST, and generates a permission cryptogram, including {DD, RMST}KMST. The wallet server returns this permission to the mobile communication device (626). The mobile communication device injects the card data, IDI and the permission into the MST (628). The MST decrypts the permission using KMST and obtains DD and RMST, and validates the card data with DD (630). The MST knows RMST is fresh so there is no replay attack. Successful decryption also suggests that the permission came from the wallet server. The MST then independently computes a hash of the data and compares it to the corresponding portion of DD. If the two matches, the MST proceeds and installs the data. As described above, the data may include, for example, the TRACK. Further, in this process, the wallet server does not have access to the card data throughout the provisioning process. The wallet server merely provides permission to the digest of the data.
  • While FIG. 6 is described with respect to performing card provisioning without going through the wallet server, the card issuer serve may communicate with the wallet server to perform card provisioning and the provisioning and authentication sever may handle the authentication. It should also be appreciated that there are numerous ways in which the various servers may communicate with each other to perform card provisioning and authentication.
  • In another embodiment, users may authenticate with a card issuer and initiate download of cards directly from card issuers. If the card is from a participating issuer that has the capabilities to authenticate dynamic cards, either by themselves or by their payment network, the wallet server may automatically initiate a conversion of the static track data into a dynamic card via the provisioning and authentication server. A method 700 for provisioning a dCVV card according to an illustrative embodiment is described with reference to FIG. 7. The user (i.e., a user having an account with the card issuer) authenticates with the card issuer server.
  • In this embodiment, the mobile communication device sends authentication information (for example, IDMST, RMST, username, password, and A* (where A* includes information, such as, an issuer account credential based on the issuer's authentication requirements)) to the wallet server (702). The wallet server forwards the authentication information (for example A*) to the card issuer server for verification (704). The card issuer server performs a validation and sends back to the wallet server the TRACK for the card and any other information required for presentation (for example, TRACK and C* (where C* may include a logo, image and/or other artwork) (706).
  • The wallet server checks and determines whether the card issuer is registered and/or participates in dynamic card authentication (708). If the card issuer does not, then the process proceeds win accordance with static card provisioning, as described above. If the card issuer does participate in dynamic card authentication, the wallet server sends a request for provisioning to the provisioning and authentication server (710). The request may include the PAN and auxiliary information, such as a CVV-2, name, date of birth, answer to a challenge question, and/or other information.
  • The provisioning and authentication server generates a random key (KdCVV) for the card (712), and inserts in its database a 3-tuple of: {PAN, KdCVV, Tstamp} (as described above with reference to FIG. 5). The provisioning and authentication server sends the KdCVV to the wallet server, optionally along with the auxiliary information B* (714). The wallet server retrieves the MST's KMST from IDMST, and sends KdCVV and SYNC (where SYNC contains the time-stamp information, and is used to synchronize time between the MST and the wallet server) to the mobile communication device (716), which forwards KdCVV and SYNC to the MST (718). KdCVV and SYNC may be encrypted or signed using KMST to provide security. The wallet server may also send some additional information to the MST, via the mobile communication device, along with KdCVV; for example, the wallet server may also send TRACK, RMST, RS, B*, where B* is some auxiliary information from the card issuer.
  • Once the card(s) or TRACK(s) are loaded into the MST, the MST may be used to transmit the card data at a POS to effect a transaction. In one aspect, the data may be dynamically generated to provide security to the data being transmitted.
  • In this aspect, at each transmission, the MST constructs, for example, modified track 2 data (MT) containing a dCVV, which is derived from the card data, Tstamp from the MST (the current time stamp from the MST) and KdCVV. The dCVV may include a 3 digit code that is computed as a function of KdCVV, including the PAN, expiration date of the card (EXP), service code (SVC), and Tstamp. For example, dCVV=fKdCVV(PAN, EXP, SVC, Tstamp). After dCVV is generated, the counter value stored in the MST within the current time unit interval (i.e. 10 min, 1 hour, etc.), is incremented by one.
  • A method 800 for performing dCVV according to an illustrative embodiment is described with reference to FIG. 8. The sequence of steps of transmission and verification by the card issuer server include the MST sending modified card data with dCVV to a POS terminal (802), which forwards the modified card data to an acquirer server (804), which then forwards the modified card data to the card issuer server (806). The payload of the transmission may include: a start sentinel (SS), PAN, field separator (FS), EXP, SVC, Tstamp, dCVV, MI, end sentinel (ES), and an error checksum character (LRC). The MI may be a flag for the card issuer server to recognize and perform authorization in the dCVV mode. However, the MI may not be used if a future EXP is used as such an indicator, as described in further detail below.
  • Upon receiving the data, the card issuer server may understand the transmission is a dCVV transaction based on the MI or future EXP. It should also be appreciated that a PAN can also be registered by a provisioning and authentication server to do a match during transaction so that a PAN registered may be checked against the provisioning and authentication server for authentication of the dCVV. The card issuer server may request the provisioning and authentication server for verification of dCVV (808). The provisioning and authentication server then returns an authentication or an authorization failure (810). If the PAN is not found, the provisioning and authentication server returns a PAN not registered error. The provisioning and authentication server compares the Tstamp received with the time that is currently on the server. The comparison algorithm may be performed as follows: if the Tstamp received is later in time than the Tstamp stored, the time stamp is ok; if the Tstamp received is earlier in time than the Tstamp stored, the time stamp is incorrect and returns an authorization failure; if the Tstamp received matches the Tstamp stored return an authorization failure is returned the counter value received is less than the counter value stored, otherwise the time stamp is ok.
  • During the verification, the provisioning and authentication server independently computes dCVV with KdCVV stored on the provisioning and authentication server and checks to see if the computed value is identical to the dCVV received. If the computed dCVV matches the dCVV received and the Tstamp is ok, the provisioning and authentication server updates the Tstamp currently stored with the Tstamp it received. The provisioning and authentication server then returns an authentication or an authorization failure (810). If the computed value is not identical to the dCVV received, the provisioning and authentication server returns an authorization failure. The card issuer server may also perform one or more routine checks that the card issuer server usually conducts when authorizing a regular card (812) and returns a final authorization result to the acquirer server (814), which forwards the message to the POS (816). If a failure is returned to the POS, the transaction may be cancelled. If final authorization is returned to the POS, the transaction may proceed.
  • In another embodiment, a payment network (for example, VISA) or a third party processor server may handle the dCVV and authorize the transaction. FIG. 9 illustrates such a method 900 for performing dCVV according to an illustrative embodiment. In this embodiment, the modified track data containing the dCVV is sent from the MST to the POS terminal (902), which forwards the modified card data to the acquirer server (904), which then forwards the modified card data to a payment network, such as a server operated by VISA (906), if applicable. In some cases the acquirer server sends the transaction directly to the card issuer or processor server bypassing the payment network (known as an “on us” transaction), for these cases the provisioning authentication server would be hosted at the card issuer or processor server instead. As described above, the dCVV may include a 3 digit code that is computed as a function of KdCVV, including the PAN, expiration date of the card (EXP), service code (SVC), and Tstamp. For example, dCVV=fKdCVV (PAN, EXP, SVC, Tstamp). After dCVV is generated, the counter value stored in the MST within the current time unit interval (i.e. 10 min, 1 hour, etc.), is incremented by one.
  • The payment network then checks whether the data corresponds to a dynamic card (908), for example, by checking for the MI or a modified EXP value. As described herein, replacing a current EXP with fixed date in the future (for example, December 2048) can function as a MI. Upon seeing this specific EXP, the payment network can proceed with dCVV validation. When the EXP is used as a MI, there is no need to allocate an additional digit for MI and the original, true EXP on the physical card issued can be protected because it is not transmitted.
  • When the payment network recognizes the data as dynamic, the payment network requests the provisioning and authentication server for verification of the dCVV (910), for example, using the PAN. If the PAN is not found within the provisioning and authentication server, an authorization failure is returned to the POS. When the PAN is in the provisioning and authentication server, the provisioning and authentication server verifies the card (912). To perform this verification, the provisioning and authentication server may check to see if the Tstamp received from the transaction is recent based on its own server time, i.e., that it is not a replay of an old transaction. For example, the provisioning and authentication server compares the Tstamp it received from the transaction with the Tstamp it last saw under the same card. If the Tstamp received is greater (later in time) than the Tstamp stored, the time stamp is ok; if the Tstamp received is less (earlier in time) than the Tstamp stored, the time stamp is incorrect, an authorization failure is returned; and if the Tstamp received is equal to the Tstamp stored, an authorization failure is returned when CCReceived is less than CCStored, otherwise the time stamp is ok. When the time stamp is ok, the provisioning and authentication server updates the Tstamp currently stored with the Tstamp it received, and in the last case, CCStored is i incremented by one.
  • The provisioning and authentication server independently computes the dCVV using the KdCVV stored, and checks to see if the computed value matches the one received. If not, an authorization failure is returned. If the dCVV cryptogram is both valid and freshly generated, the provisioning and authentication server performs a process of restore. This process removes the dynamic components of the track data, such as, SVC, TStamp and dCVV, and inserts the original track content at the corresponding locations inside the track. This process completely restores the original track data (TRACK) as issued by the card issuer. The provisioning and authentication server then sends the restored TRACK to the payment network (914).
  • The payment network may also forward the TRACK to the card issuer server for verification (916), which verifies the TRACK and sends a verification or an authorization failure back to the payment network (918). The payment network then sends the authorization of payment or an authorization failure to the acquirer server (920), which forwards the authorization of payment or authorization failure to the POS (922).
  • When the card issuer utilizes a third party processor, the payment network may communicate with the third party processor to verify the TRACK. Additionally, in come embodiments, the card issuer server or the third party processor may communicate directly with the provisioning and authentication server to verify the dCVV and process the transaction.
  • In another aspect, the user may utilize the dCVV and/or modified EXP date in a CNP transaction, for example, when filling out an online payment form. In this aspect, the wallet application on the mobile communication device, may calculate or cause the MST to calculate the dCVV and/or modified EXP and display one or more of these to the user. The user may then input the dCVV and/or modified EXP into an online transaction form and send the modified track data, including the dCVV and/or modified EXP, to an ecommerce server (924), the ecommerce server may then forward the modified track data to the acquirer server (926). The authorization may then proceed as described above with reference to steps 906-920.
  • Another way to indicate card data as a dCVV track transmission is to use a modified EXP value. As an example, replacing the card's current EXP with a fixed value, for example, ‘4812’ (December-2048). Upon seeing this specific EXP, the card issuer server can proceed under the dCVV mode. In this aspect, there is no need to allocate an additional digit for MI and the original, the true EXP on the physical card issued can be protected because it is not transmitted, thus protecting the PAN to be used with EXP and name for certain online or CNP transactions. If MI is not used, the dCVV occupies 6 digits.
  • In an aspect, this disclosure also relates to devices, systems, and methods that obscure and reuse the EXP in transactions or card systems. Replacing the EXP with a number equivalent to a date far into the future obscures the EXP in the transaction while providing the card issuer with a convenient flag to recognize the card as being dynamic. For example, if an unauthorized person tries to use this EXP for an online purchase, it would be declined by the card issuer server, unless it is accompanied by a CVV-2 that is also dynamically generated by a MST, or by remote means from a Token Service Provider (TSP) (for example, the provisioning and authentication server) or a card issuer server, displayed to the cardholder on his/her mobile device at time of transaction request and would change on each new request by user, and expires after a short time. This dynamic CVV-2 can then be authenticated in the provisioning authentication server run by the card issuer server or TSP. Thus making stolen card data for dynamic or dCVV cards effectively useless for not only card present transactions, but also for CNP transactions, because the number taking the place of the EXP can be used as a special indicator for dynamic security or dCVV cards.
  • This is important because it can help card issuers/card issuer servers provide a more secure transaction method for their card holders not only for physical card payments using existing POS infrastructure, but also for online or CNP card payments also using the existing CNP payment infrastructure without changing the merchants' online checkout systems. It is a fast solution to improve online payment security without waiting for massive merchant change.
  • Given that the card data may be generated for each new transaction and delivered via a mobile communication device instead of on plastic cards, the EXP for these types of transactions may no longer be needed, the card issuers/card issuer servers do not have to replace these mobile single use cards in the field. The EXP printed on the front of the physical plastic card that issuers do send in the mail, or static cards shown in an electronic wallet can remain with the original EXP for the purpose of online shopping with consumers' plastic cards the traditional way. The card issuer/card issuer server and the network would be able to distinguish this as being a standard static card and process it accordingly.
  • In POS transactions, retail systems read the EXP and will reject the card if the EXP (MMYY) data on the magnetic stripe or in the EMV message is earlier than the current date. EXPs far in the future, however are accepted by the POS and acquirer systems as valid.
  • The EXP on the magnetic stripe, in a magnetic stripe transmission (MST) or smart card (such as, an EMV card) message may be replaced by a specific number that represents a date far in the future. The number, in the YYMM format, that is interpreted by the POS reading it as a future date, but to the card issuer/card issuer server it is in fact an indicator that the card data contains a variable authentication element, such as a dCVV. For example, the EXP may be replaced with a number 4912. The retail system would interpret this number as a future date (December, 2049) while the card issuer/card issuer server would recognize 4912 as an indicator for a dCVV card and switch or process it accordingly.
  • FIG. 10 illustrates how the track 2 data is modified according to an aspect of the disclosure. This merely illustrates the concept of a dCVV track format. The track 1 dCVV format is similar, but with an added field, such as, a card holder name and its field separators.
  • As illustrated in FIG. 10, a Dynamic Mode Indicator (DMI or just MI) 1000 may be used to replace the card EXP 1002. The DMI 1000 is a 4 digit long number that replaces the card EXP 1002 and is set far in the future. POS systems and acquirers read the DMI 1000 as an expiry data, but the card issuers/card issuer servers recognize the number as an indicator of the dynamic or token mode. Additionally, the Pin Verification Key Indicator (PVKI)/discretionary data 1004 may be modified or replaced with dynamic data or a token 1006.
  • The dynamic data 1006 typically contains of two parts: the time-stamp (or in a counter-based variant, a 7 digit monotonically increasing number), and the dCVV which is a 3 digit to 6 digit numeric string computed using a one-way-keyed-hash function over SS, PAN, DMI and SVC. The MST may be configured to adjust its internal reference of time, for example, to Jan/1/2014 15:00. This allows the MST to provide an accurate time-stamp. The MST transmits the time-stamp plus a cryptogram which is generated using the KdCVV, PAN, EXP, and the time-stamp (the time-stamp+cryptogram is 1006). Since the time-stamp is synchronized, as described above, the server that performs authorization can check for packet freshness and verify the cryptogram. The use of time-stamp serves to prevent replay type attacks because the cryptogram generation is time-stamped, and any delay in consuming the cryptogram risks it being rejected by the authorization logic on server.
  • Thus, stolen magnetic stripe or smart card data containing the PAN and the modified EXP (DMI) would not be useful for card not present fraud because the EXP obtained from the stolen card data would not match the EXP on file for the account and thus would be declined by the card issuer/card issuer server.
  • FIG. 11 illustrates a block flow diagram of a method 1100 of dCVV for online e-commerce transactions. As illustrated in FIG. 11, the user authenticates with the card issuer server and a card is provisioned into the MST that supports dynamic CVV, illustrated as block 1102, as described above. The card issuer server and/or payment network records, in the provisioning and authentication server, that the provisioned card supports dCVV mode for online e-commerce transactions only or for both e-commerce and physical swipe at POS transactions, illustrated as block 1104. As described above, the PAN (or hash of the PAN) may be used as an identifier in the provisioning and authentication server, a KdCVV may also be issued and securely delivered to the MST.
  • A user may then use the card at checkout at an online e-commerce website. For example, the user may cause the mobile communication device to display the 16 digit PAN and EXP for the provisioned card via the wallet application, illustrated as block 1106. The user may then enter the PAN and EXP into an online e-commerce website at checkout, illustrated as block 1108. The wallet application working with the MST calculates and displays a dynamically generated CVV-2 for the user to enter into the online e-commerce website, illustrated as block 1110.
  • The EXP can be the real EXP of the card or a modified future EXP for use as a mode indicator. When the EXP is not modified, the provisioning and authentication server authorizes the transaction based on dCVV because it knows, based on the PAN, that the card is registered under dCVV for e-commerce transactions. When the EXP is modified, this provides a blurring effect that hides the true EXP; and an additional insurance that the card should be authorized under dCVV.
  • The CVV-2 may be calculated by the wallet application and MST based on the PAN, real EXP, SVC and the current time-stamp. Since the time-stamp is implicitly and universally synchronized, as described above, the authorization server (for example, the card issuer server or provisioning and authentication server) does not need to be informed of the time-stamp that the CVV-2 was based on. The CVV-2 here may be a deterministic function of the cryptogram described above and generated in a substantially similar way. The cryptogram may also be digitized using a digitization function. For example, by taking the first three character from the cryptogram and performing a modulo operation on every character, for example, by 10, to obtain the 3-digit CVV-2.
  • The user enters the dynamically generated CVV-2 into the online e-commerce website, illustrated as block 1112. The authorization server (for example, the card issuer server, the payment network, or provisioning and authentication server) receives the PAN, EXP, Name, and CVV-2 and checks its current time-stamp, and independently computes CVV-2 using the same algorithm, illustrated as block 1114. The computed CVV-2 is compared with the CVV-2 entered by the user, illustrated as block 1116, to authorize the transaction if they match, illustrated as block 1118, or reject the transaction if they do not match, illustrated as block 1120. The authorization server (for example, the card issuer server, the payment network, or provisioning and authentication server) may also tolerate +/−X time-stamp where X is configurable.
  • In the event, the online e-commerce website or merchant stores the EXP and not the CVV2 for repeat transactions, the card issuer may allow the transaction to go through without the CVV2. For example, a CVV2 may not be required for a recurring payment and when there is an indication that the merchant is using the card data for recurring payment purposes the card issuer may allow the transaction to proceed. In the case where the EXP is dynamic, when the EXP is reused during a normal transaction the transaction may fail. In any event, when using recurring payments, the card issuer may choose to allow the transaction to continue because a previously valid transaction was successfully completed, otherwise the card issuer may decline the transaction. Similarly for refunds, card issuers may rely on the PAN to issue a refund relating to a particular transaction in their own system.
  • In general, the MST 102 can be used to interact with a merchant point of sale (POS) by transmitting card data from a magnetic field transmitter to a magnetic stripe reader (MSR) of the merchant POS and used in e-commerce transactions as described above. As illustrated in FIG. 12, the MST 102 may include a microprocessor 1202, a light-emitting diode (LED) indicator 1204, a power source 1206, optionally a magnetic stripe reader (MSR) 1208, a memory storage component or secure element 1210, an input/output interface 1212 (for example, a 3.5 mm or other standard audio port, a USB port/jack interface or other communication interface, including but not limited to a 30 pin or 9 pin Apple interface, a Bluetooth interface, and other serial interfaces), and a magnetic field transmitter 1214 which includes a driver and an inductor for transmitting magnetic pulses to be received by any POS device with a MSR, such as the POS 120.
  • Microprocessor 1202 handles security and communications with the mobile communication device 104. The microprocessor 1202 can also transmit and receive encrypted card data to and from the secure element 1210. The magnetic field transmitter 1214 transmits magnetic stripe data of a cardholder to the POS device 120 by transmitting magnetic impulses to the MSR of the POS device 120. The MST 102 may also be used for reading other magnetic stripe cards by using the optional MSR 1208. The MSR 1208 may be used for loading payment card data onto the secure element 1210 and for capturing card track data.
  • The mobile communication device 104 includes the wallet application, and may also include a display with key pad or touchpad display and a central processing unit (CPU). The wallet application initializes and unlocks the MST 102, interacts with the MST 102 and accepts card payment data from the MST 102. The mobile communication device 104 may also interact with the MST 102 to display a CVV-2 for the user to enter into an online e-commerce transaction using dCVV.
  • The card data may be encrypted, and the encrypted data may be transmitted to the mobile communication device 104. The wallet application may transmit the data to the server. The data may be decrypted at the server and the primary account number (PAN) data, card number, expiration and name of the cardholder is stripped from the track data. The wallet application or the server may also make a determination as to whether the magnetic card is a payment card or a non-payment card. If the magnetic card is a non-payment card the MST 102 can automatically store the card data in the memory for non-payment transmission. If the magnetic card is a payment card, for example, having a specific format recognizable to the system, the card may be detected as a payment card and the system determines if the name on the payment card matches the name of the user account. If the name does not match, an error message may arise. If the name on the payment card matches the name of the user account, the system may determine if the PAN number matches an existing card already stored on the server, to either create a new account or leave the existing one. If a new card is created, the system may store the card data in a payment section of MST's secure memory encrypted.
  • As described above, the MST 102 has the ability to load any type of magnetic stripe card into the memory means, not just payment cards. Non-payment cards may be stored separately with less security for convenience. For example, some non-payment applications may include cards to open doors, loyalty cards, etc. The loading of payment data vs. non-payment data may be separated into two separate fields or storage areas. In an example, payment cards may not be loaded into non-payment storage. For example, payment data may have a specific format that can be detected and may not be allowed to be loaded into the non-payment storage area. The payment cards may also require authentication with the application before being transmitted. On the other hand, default non-payment data may be transmitted without authentication.
  • The devices, systems, and methods disclosed herein provide for the card data to be captured and stored in the MST's secure memory means directly by the user without modification, and to be used later with a POS or other MSR device. The unique connection or registering of a MST to a user account such that the MST can be only used with that account for card data storage and transmission use provides security.
  • The MST is capable of connecting to mobile communication devices via different interfaces beyond audio jack and USB connections (such as Bluetooth, and other wireless communication interfaces). The devices, systems, and methods allow for the loading of encrypted card data into the memory means of the MST that can later be decrypted and transmitted to the POS, or can be transmitted encrypted to the mobile communication device and then routed to the payment server for decryption and processing for loading a user account on the server or processing a POS transaction. The devices, systems, and methods provide for the ability to use the stored card data or swiped card data for virtual checkout environments for a more secure and lower cost transaction for merchants. The devices, systems, and methods provide for the remote loading and transmission of card data from a card issuer to the wallet server provider, to the wallet application on the mobile communication device, and to the SE or memory means of the MST for later use. The devices, systems, and methods also provide for the ability to load loyalty account information along with the payment card data into one or more discretionary fields of the card data to be read by the issuer during or after a transaction, which can lead to offers and loyalty programs combined with a payment transaction.
  • Generally, the devices, systems, and methods disclosed herein can include, and may be implemented within, a number of different devices and computer systems, including, for example, general-purpose computing systems, POS systems, server-client computing systems, mainframe computing systems, a cloud computing infrastructure, telephone computing systems, laptop computers, desktop computers, smart phones, cellular phones, personal digital assistants (PDAs), tablet computers, and other mobile devices. The devices and computing systems may have one or more databases and other storage apparatuses, servers, and additional components, for example, processors, modems, terminals and displays, input/output devices, computer-readable media, algorithms, modules, and other computer-related components. The devices and computer systems and/or computing infrastructures are configured, programmed, and adapted to perform the functions and processes of the systems and methods as disclosed herein.
  • Communications between components in the devices, systems, and methods disclosed herein may be unidirectional or bidirectional electronic communication through a wired or wireless configuration or network. For example, one component may be wired or networked wirelessly directly or indirectly, through a third party intermediary, over the Internet, or otherwise with another component to enable communication between the components. Examples of wireless communications include, but are not limited to, radio frequency (RF), infrared, Bluetooth, wireless local area network (WLAN) (such as WiFi), or wireless network radio, such as a radio capable of communication with a wireless communication network such as a Long Term Evolution (LTE) network, WiMAX network, 3G network, 4G network, and other communication networks of the type.
  • The methods disclosed herein may be performed in different forms of software, firmware, and/or hardware. The methods disclosed herein may be performed on a single device or may be performed on multiple devices. For example, program modules including one or more components may be located in different devices and may each perform one or more aspects of the present disclosure.
  • Although the devices, systems, and methods have been described and illustrated in connection with certain embodiments, many variations and modifications will be evident to those skilled in the art and may be made without departing from the spirit and scope of the disclosure. The discourse is thus not to be limited to the precise details of methodology or construction set forth above as such variations and modification are intended to be included within the scope of the disclosure.

Claims (21)

What is claimed is:
1. A method for creating dynamic card data, comprising:
receiving, by a device, card track data;
encrypting, by the device, the card track data using a first key;
sending, by the device, the encrypted card track data to a server;
receiving, by the device, a working key;
generating, by the device, modified card track data including a time-dependent CVV using the working key; and
sending, by the device, the modified card track data to a point of sale terminal or causing the modified card track data to be displayed to a user for use in an e-commerce transaction.
2. The method of claim 1, wherein an expiration date, a registered primary account number, or a portion of a discretionary field of the modified track data indicates to a card issuer or a third party service provider that the modified card track data is dynamic-CVV (dCVV) card track data and authorization is to be performed in a dCVV mode.
3. The method of claim 1, wherein the sending the modified card track data to the point of sale terminal includes sending the time-dependent CVV, and a dynamic mode indicator.
4. The method of claim 3, wherein the dynamic mode indicator is a primary account number, an expiration date, or a separate dynamic mode indicator of the modified track data.
5. The method of claim 4, wherein the dynamic mode indicator indicates to a card issuer or third party service provider, that the modified card track data is dynamic-CVV (dCVV) card track data and authorization is to be performed in a dCVV mode.
6. The method of claim 1, wherein the device is a magnetic stripe storage and transmission device or a mobile communication device.
7. A method for provisioning dynamic financial card data by issuer, comprising:
receiving, by a server, a request for provisioning card track data;
requesting, by the server, an authentication of a user corresponding to the card track data from a card issuer server, wherein the card issuer server corresponds to a card issuer of the card track data;
receiving, by the server, an authentication result from the card issuer server; and
generating, by the server, a working key for the generation of dynamic card track data.
8. The method of claim 7, wherein the requesting the authentication of the user from the card issuer server includes sending a primary account number and at least one of a CVV-2, a name, a date of birth, a username and password, and an answer to a challenge question to the card issuer server for authentication.
9. The method of claim 7, further comprising securely sending the working key to a wallet server.
10. The method of claim 7, further comprising receiving a request for verification of a dynamic-CVV (dCVV) in response to initiation of a payment transaction, wherein the dCVV is based on the working key.
11. The method of claim 10, wherein the receiving the request for verification of the dCVV includes receiving a primary account number, an expiration date, a service code, a time-stamp, and a mode indicator.
12. The method of claim 11, further comprising comparing the received time-stamp with a stored time-stamp or current time on the server for verifying a transaction.
13. The method of claim 12, further comprising sending an authorization failure in response to the stored time-stamp or current time corresponding to a time greater than the received time-stamp.
14. A method for performing dynamic-CVV (dCVV), comprising:
generating, by a server, a working key for card track data;
receiving, by a magnetic stripe storage and transmission device (MST), the working key;
generating, by the MST, modified card track data including a dCVV component based on original card track data, a time-stamp or counter and the working key;
sending the modified card track data to a point of sale terminal or e-commerce website for payment processing;
receiving, by the server, a request for verification of the dCVV from a card issuer server or a third party service provider in response to initiation of the payment processing, wherein the request includes the modified card track data;
performing, by the server, a verification of the dCVV component; and
sending, by the server, a verification failure or final verification based on the verification of the dCVV component.
15. The method of claim 14, wherein the modified card track data includes the dCVV component, a primary account number, an expiration date, a service code, the time-stamp or counter, and optionally a separate mode indicator when the expiry date or the primary account number is not used to indicate that authorization is to be performed in a dCVV mode.
16. The method of claim 15, wherein the mode indicator indicates to the card issuer server that the modified card track data is dCVV card track data and authorization is to be performed in a dCVV mode.
17. The method of claim 15, wherein the performing the verification includes comparing a received time-stamp or received counter with a stored time-stamp or a current time of the server or stored counter.
18. The method of claim 17, wherein the sending the verification failure or final verification includes sending the verification failure in response to the stored time-stamp or current time of the server corresponding to a time greater than the received time-stamp.
19. The method of claim 15, wherein the performing the verification includes:
independently computing, by the server, a dCVV vale using the working key; and
comparing the computed dCVV value with the dCVV component.
20. The method of claim 19, wherein the sending the verification failure or final verification includes sending the final verification in response to the computed dCVV value matching the received dCVV component.
21. The method of claim 14, further comprising sending, by the server, the original card track data to the card issuer server for processing via the card issuer server's normal processing methods to complete a transaction, wherein the original card track data corresponds to data of a card issuer corresponding to the card issuer server.
US14/511,994 2014-02-21 2014-10-10 Methods, devices, and systems for secure provisioning, transmission, and authentication of payment data Abandoned US20150371234A1 (en)

Priority Applications (19)

Application Number Priority Date Filing Date Title
US14/511,994 US20150371234A1 (en) 2014-02-21 2014-10-10 Methods, devices, and systems for secure provisioning, transmission, and authentication of payment data
CN201610115717.XA CN105701661B (en) 2014-02-21 2015-02-13 Method, apparatus and system for secure configuration, transmission and verification of payment data
AU2015219276A AU2015219276B2 (en) 2014-02-21 2015-02-13 Methods, devices, and systems for secure provisioning, transmission, and authentication of payment data
SG11201602941WA SG11201602941WA (en) 2014-02-21 2015-02-13 Methods, devices, and systems for secure provisioning, transmission, and authentication of payment data
EP15751639.4A EP3061056B1 (en) 2014-02-21 2015-02-13 Methods, devices, and systems for secure provisioning, transmission, and authentication of payment data
CA2927113A CA2927113C (en) 2014-02-21 2015-02-13 Methods, devices, and systems for secure provisioning, transmission, and authentication of payment data
KR1020167014095A KR101784125B1 (en) 2014-02-21 2015-02-13 Methods, devices, and systems for secure provisioning, transmission, and authentication of payment data
JP2016537567A JP6263624B2 (en) 2014-02-21 2015-02-13 Method, apparatus and system for secure provisioning, transmission and authentication of payment data
KR1020177009092A KR101815430B1 (en) 2014-02-21 2015-02-13 Methods, devices, and systems for secure provisioning, transmission, and authentication of payment data
PCT/US2015/015855 WO2015126753A1 (en) 2014-02-21 2015-02-13 Methods, devices, and systems for secure provisioning, transmission, and authentication of payment data
EP16174401.6A EP3113095A1 (en) 2014-02-21 2015-02-13 Methods, devices, and systems for secure provisioning, transmission, and authentication of payment data
SG10201702208RA SG10201702208RA (en) 2014-02-21 2015-02-13 Methods, devices, and systems for secure provisioning, transmission, and authentication of payment data
CN201580000178.9A CN105027153A (en) 2014-02-21 2015-02-13 Methods, devices, and systems for secure provisioning, transmission, and authentication of payment data
RU2016118742A RU2648944C2 (en) 2014-02-21 2015-02-13 Methods, devices, and systems for secure provisioning, transmission and authentication of payment data
HK16111280.8A HK1223179A1 (en) 2014-02-21 2015-12-16 Methods, devices, and systems for secure provisioning, transmission, and authentication of payment data
HK15112404.8A HK1211724A1 (en) 2014-02-21 2015-12-16 Methods, devices, and systems for secure provisioning, transmission, and authentication of payment data
US14/980,718 US9864994B2 (en) 2014-02-21 2015-12-28 Terminal for magnetic secure transmission
AU2016202504A AU2016202504B2 (en) 2014-02-21 2016-04-20 Methods, devices, and systems for secure provisioning, transmission, and authentication of payment data
JP2016115371A JP6214724B2 (en) 2014-02-21 2016-06-09 Method, apparatus and system for secure provisioning, transmission and authentication of payment data

Applications Claiming Priority (3)

Application Number Priority Date Filing Date Title
US201461942681P 2014-02-21 2014-02-21
US201461974696P 2014-04-03 2014-04-03
US14/511,994 US20150371234A1 (en) 2014-02-21 2014-10-10 Methods, devices, and systems for secure provisioning, transmission, and authentication of payment data

Related Child Applications (1)

Application Number Title Priority Date Filing Date
US14/980,718 Continuation US9864994B2 (en) 2014-02-21 2015-12-28 Terminal for magnetic secure transmission

Publications (1)

Publication Number Publication Date
US20150371234A1 true US20150371234A1 (en) 2015-12-24

Family

ID=53878845

Family Applications (2)

Application Number Title Priority Date Filing Date
US14/511,994 Abandoned US20150371234A1 (en) 2014-02-21 2014-10-10 Methods, devices, and systems for secure provisioning, transmission, and authentication of payment data
US14/980,718 Active US9864994B2 (en) 2014-02-21 2015-12-28 Terminal for magnetic secure transmission

Family Applications After (1)

Application Number Title Priority Date Filing Date
US14/980,718 Active US9864994B2 (en) 2014-02-21 2015-12-28 Terminal for magnetic secure transmission

Country Status (11)

Country Link
US (2) US20150371234A1 (en)
EP (2) EP3061056B1 (en)
JP (2) JP6263624B2 (en)
KR (2) KR101815430B1 (en)
CN (2) CN105027153A (en)
AU (2) AU2015219276B2 (en)
CA (1) CA2927113C (en)
HK (2) HK1211724A1 (en)
RU (1) RU2648944C2 (en)
SG (2) SG11201602941WA (en)
WO (1) WO2015126753A1 (en)

Cited By (152)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20150310439A1 (en) * 2014-04-28 2015-10-29 Mastercard International Incorporated Method for generating and updating alternate security codes for payment cards
US20150348044A1 (en) * 2014-05-30 2015-12-03 Verizon Patent And Licensing Inc. Secure credit card transactions based on a mobile device
US20160132881A1 (en) * 2014-11-12 2016-05-12 Samsung Electronics Co., Ltd. Apparatus and method for payment
US20160162883A1 (en) * 2014-12-04 2016-06-09 Mastercard International Incorporated Methods and apparatus for conducting secure magnetic stripe card transactions with a proximity payment device
US20160247144A1 (en) * 2015-02-12 2016-08-25 Samsung Electronics Co., Ltd. Payment processing method and electronic device supporting the same
US20160308587A1 (en) * 2015-04-14 2016-10-20 Sang-Hyo Lee Near field communication package and portable device including the same
US20160328341A1 (en) * 2015-05-07 2016-11-10 Broadcom Corporation Near Field Communication (NFC) Enabled Peripheral Device
US20160345125A1 (en) * 2015-05-21 2016-11-24 Samsung Electronics Co., Ltd. Electronic device and method for performing wireless communication thereof
WO2017142135A1 (en) * 2016-02-15 2017-08-24 엘지전자 주식회사 Mobile terminal
US20170255923A1 (en) * 2016-03-01 2017-09-07 Google Inc. Direct settlement of hands-free transactions
US20170300904A1 (en) * 2016-04-15 2017-10-19 Samsung Electronics Co., Ltd. Electronic device and payment method using the same
WO2018022459A1 (en) * 2016-07-28 2018-02-01 Samsung Pay, Inc. Transmission-pulse sequence including proxy for secondary magnetic stripe
EP3333791A1 (en) * 2016-12-12 2018-06-13 Gemalto Sa Method for generating a cryptogram in a user device and verifying this cryptogram in a payment server, corresponding user device and payment server
US20180232725A1 (en) * 2017-02-14 2018-08-16 Its, Inc. Payment tokenization using separate token vault
WO2018216001A1 (en) * 2017-05-25 2018-11-29 Mir Limited Dynamic verification method and system for card transactions
CN109074573A (en) * 2016-04-08 2018-12-21 三星电子株式会社 The electric paying method of portable unit and portable unit
US20190005490A1 (en) * 2015-12-22 2019-01-03 Idemia France Authentication method
US10212148B2 (en) 2013-12-16 2019-02-19 Mbr Innovations Llc Systems and methods for verifying attributes of users of online systems
US10395236B2 (en) * 2015-10-20 2019-08-27 Lg Electronics Inc. Mobile terminal and method for controlling the same
US10410205B2 (en) * 2015-08-21 2019-09-10 Samsung Electronics Co., Ltd. Apparatus and method for performing payment transaction using dynamic MST configuration
US10425129B1 (en) 2019-02-27 2019-09-24 Capital One Services, Llc Techniques to reduce power consumption in near field communication systems
US10438437B1 (en) * 2019-03-20 2019-10-08 Capital One Services, Llc Tap to copy data to clipboard via NFC
US10460317B2 (en) 2014-07-11 2019-10-29 Google Llc Hands-free transaction tokens via payment processor
US10467445B1 (en) 2019-03-28 2019-11-05 Capital One Services, Llc Devices and methods for contactless card alignment with a foldable mobile device
US10467622B1 (en) 2019-02-01 2019-11-05 Capital One Services, Llc Using on-demand applications to generate virtual numbers for a contactless card to securely autofill forms
US10474879B2 (en) 2016-07-31 2019-11-12 Google Llc Automatic hands free service requests
US10482463B2 (en) 2016-03-01 2019-11-19 Google Llc Facial profile modification for hands free transactions
US10489781B1 (en) 2018-10-02 2019-11-26 Capital One Services, Llc Systems and methods for cryptographic authentication of contactless cards
US10498401B1 (en) 2019-07-15 2019-12-03 Capital One Services, Llc System and method for guiding card positioning using phone sensors
US10506426B1 (en) 2019-07-19 2019-12-10 Capital One Services, Llc Techniques for call authentication
US10505738B1 (en) 2018-10-02 2019-12-10 Capital One Services, Llc Systems and methods for cryptographic authentication of contactless cards
US10511443B1 (en) 2018-10-02 2019-12-17 Capital One Services, Llc Systems and methods for cryptographic authentication of contactless cards
US10510074B1 (en) 2019-02-01 2019-12-17 Capital One Services, Llc One-tap payment using a contactless card
US10516447B1 (en) 2019-06-17 2019-12-24 Capital One Services, Llc Dynamic power levels in NFC card communications
US10523708B1 (en) 2019-03-18 2019-12-31 Capital One Services, Llc System and method for second factor authentication of customer support calls
US10535062B1 (en) 2019-03-20 2020-01-14 Capital One Services, Llc Using a contactless card to securely share personal data stored in a blockchain
US10541995B1 (en) 2019-07-23 2020-01-21 Capital One Services, Llc First factor contactless card authentication system and method
US10542036B1 (en) 2018-10-02 2020-01-21 Capital One Services, Llc Systems and methods for signaling an attack on contactless cards
EP3507756A4 (en) * 2016-08-30 2020-01-22 No Common Payment AB Generation and verification of a temporary card security code for use in card based transactions
US10546444B2 (en) 2018-06-21 2020-01-28 Capital One Services, Llc Systems and methods for secure read-only authentication
US10554411B1 (en) 2018-10-02 2020-02-04 Capital One Services, Llc Systems and methods for cryptographic authentication of contactless cards
US10565587B1 (en) 2018-10-02 2020-02-18 Capital One Services, Llc Systems and methods for cryptographic authentication of contactless cards
US10582386B1 (en) 2018-10-02 2020-03-03 Capital One Services, Llc Systems and methods for cryptographic authentication of contactless cards
US10581611B1 (en) 2018-10-02 2020-03-03 Capital One Services, Llc Systems and methods for cryptographic authentication of contactless cards
US10579998B1 (en) 2018-10-02 2020-03-03 Capital One Services, Llc Systems and methods for cryptographic authentication of contactless cards
US10592710B1 (en) 2018-10-02 2020-03-17 Capital One Services, Llc Systems and methods for cryptographic authentication of contactless cards
US10607214B1 (en) 2018-10-02 2020-03-31 Capital One Services, Llc Systems and methods for cryptographic authentication of contactless cards
US10607216B1 (en) 2018-10-02 2020-03-31 Capital One Services, Llc Systems and methods for cryptographic authentication of contactless cards
US10615981B1 (en) 2018-10-02 2020-04-07 Capital One Services, Llc Systems and methods for cryptographic authentication of contactless cards
US10623393B1 (en) 2018-10-02 2020-04-14 Capital One Services, Llc Systems and methods for cryptographic authentication of contactless cards
US10630653B1 (en) 2018-10-02 2020-04-21 Capital One Services, Llc Systems and methods for cryptographic authentication of contactless cards
US10643420B1 (en) 2019-03-20 2020-05-05 Capital One Services, Llc Contextual tapping engine
US10657754B1 (en) 2019-12-23 2020-05-19 Capital One Services, Llc Contactless card and personal identification system
US10664941B1 (en) 2019-12-24 2020-05-26 Capital One Services, Llc Steganographic image encoding of biometric template information on a card
US10680824B2 (en) 2018-10-02 2020-06-09 Capital One Services, Llc Systems and methods for inventory management using cryptographic authentication of contactless cards
US10686603B2 (en) 2018-10-02 2020-06-16 Capital One Services, Llc Systems and methods for cryptographic authentication of contactless cards
US10685350B2 (en) 2018-10-02 2020-06-16 Capital One Services, Llc Systems and methods for cryptographic authentication of contactless cards
WO2020123580A1 (en) * 2018-12-13 2020-06-18 Carrier Corporation Wireless access control using an electromagnet
US10701560B1 (en) 2019-10-02 2020-06-30 Capital One Services, Llc Client device authentication using contactless legacy magnetic stripe data
US10713649B1 (en) 2019-07-09 2020-07-14 Capital One Services, Llc System and method enabling mobile near-field communication to update display on a payment card
US10733283B1 (en) 2019-12-23 2020-08-04 Capital One Services, Llc Secure password generation and management using NFC and contactless smart cards
US10733601B1 (en) 2019-07-17 2020-08-04 Capital One Services, Llc Body area network facilitated authentication or payment authorization
US10733645B2 (en) 2018-10-02 2020-08-04 Capital One Services, Llc Systems and methods for establishing identity for order pick up
US10748138B2 (en) 2018-10-02 2020-08-18 Capital One Services, Llc Systems and methods for cryptographic authentication of contactless cards
US10757574B1 (en) 2019-12-26 2020-08-25 Capital One Services, Llc Multi-factor authentication providing a credential via a contactless card for secure messaging
US10771254B2 (en) 2018-10-02 2020-09-08 Capital One Services, Llc Systems and methods for email-based card activation
US10771253B2 (en) 2018-10-02 2020-09-08 Capital One Services, Llc Systems and methods for cryptographic authentication of contactless cards
US10783519B2 (en) 2018-10-02 2020-09-22 Capital One Services, Llc Systems and methods for cryptographic authentication of contactless cards
US10796297B2 (en) 2017-01-03 2020-10-06 Samsung Electronics Co., Ltd. Method and electronic device for secure magnetic pulse transmission
US10797882B2 (en) 2018-10-02 2020-10-06 Capital One Services, Llc Systems and methods for cryptographic authentication of contactless cards
US10832271B1 (en) 2019-07-17 2020-11-10 Capital One Services, Llc Verified reviews using a contactless card
US10841091B2 (en) 2018-10-02 2020-11-17 Capital One Services, Llc Systems and methods for cryptographic authentication of contactless cards
US10853795B1 (en) 2019-12-24 2020-12-01 Capital One Services, Llc Secure authentication based on identity data stored in a contactless card
US10861006B1 (en) 2020-04-30 2020-12-08 Capital One Services, Llc Systems and methods for data access control using a short-range transceiver
US10862540B1 (en) 2019-12-23 2020-12-08 Capital One Services, Llc Method for mapping NFC field strength and location on mobile devices
US10860814B2 (en) 2018-10-02 2020-12-08 Capital One Services, Llc Systems and methods for cryptographic authentication of contactless cards
US10860914B1 (en) 2019-12-31 2020-12-08 Capital One Services, Llc Contactless card and method of assembly
US10871958B1 (en) 2019-07-03 2020-12-22 Capital One Services, Llc Techniques to perform applet programming
US10885410B1 (en) 2019-12-23 2021-01-05 Capital One Services, Llc Generating barcodes utilizing cryptographic techniques
US10885514B1 (en) 2019-07-15 2021-01-05 Capital One Services, Llc System and method for using image data to trigger contactless card transactions
US10909544B1 (en) 2019-12-26 2021-02-02 Capital One Services, Llc Accessing and utilizing multiple loyalty point accounts
US10909527B2 (en) 2018-10-02 2021-02-02 Capital One Services, Llc Systems and methods for performing a reissue of a contactless card
US10915888B1 (en) 2020-04-30 2021-02-09 Capital One Services, Llc Contactless card with multiple rotating security keys
US10949520B2 (en) 2018-10-02 2021-03-16 Capital One Services, Llc Systems and methods for cross coupling risk analytics and one-time-passcodes
US20210081929A1 (en) * 2015-04-17 2021-03-18 Jpmorgan Chase Bank, N.A. Systems and methods for facilitating payment application provisioning and transacting
US10963865B1 (en) 2020-05-12 2021-03-30 Capital One Services, Llc Augmented reality card activation experience
US10970712B2 (en) 2019-03-21 2021-04-06 Capital One Services, Llc Delegated administration of permissions using a contactless card
US10984416B2 (en) 2019-03-20 2021-04-20 Capital One Services, Llc NFC mobile currency transfer
US10992477B2 (en) 2018-10-02 2021-04-27 Capital One Services, Llc Systems and methods for cryptographic authentication of contactless cards
US10997592B1 (en) 2014-04-30 2021-05-04 Wells Fargo Bank, N.A. Mobile wallet account balance systems and methods
US10996708B2 (en) * 2016-03-08 2021-05-04 Thales Dis France Sa Method to compensate by a server a clock deviation of a card
US11030339B1 (en) 2020-04-30 2021-06-08 Capital One Services, Llc Systems and methods for data access control of personal user data using a short-range transceiver
US20210174362A1 (en) * 2017-10-05 2021-06-10 The Toronto-Dominion Bank System and method of session key generation and exchange
US11038688B1 (en) 2019-12-30 2021-06-15 Capital One Services, Llc Techniques to control applets for contactless cards
US11037139B1 (en) 2015-03-19 2021-06-15 Wells Fargo Bank, N.A. Systems and methods for smart card mobile device authentication
US11037136B2 (en) 2019-01-24 2021-06-15 Capital One Services, Llc Tap to autofill card data
US11062098B1 (en) 2020-08-11 2021-07-13 Capital One Services, Llc Augmented reality information display and interaction via NFC based authentication
US11062302B1 (en) * 2016-04-22 2021-07-13 Wells Fargo Bank, N.A. Systems and methods for mobile wallet provisioning
US11063979B1 (en) 2020-05-18 2021-07-13 Capital One Services, Llc Enabling communications between applications in a mobile operating system
US11100511B1 (en) 2020-05-18 2021-08-24 Capital One Services, Llc Application-based point of sale system in mobile operating systems
US11107047B2 (en) 2015-02-27 2021-08-31 Samsung Electronics Co., Ltd. Electronic device providing electronic payment function and operating method thereof
US11113685B2 (en) 2019-12-23 2021-09-07 Capital One Services, Llc Card issuing with restricted virtual numbers
US11120453B2 (en) 2019-02-01 2021-09-14 Capital One Services, Llc Tap card to securely generate card data to copy to clipboard
US11129018B2 (en) 2015-02-27 2021-09-21 Samsung Electronics Co., Ltd. Payment means operation supporting method and electronic device for supporting the same
US11132693B1 (en) 2014-08-14 2021-09-28 Wells Fargo Bank, N.A. Use limitations for secondary users of financial accounts
US11138593B1 (en) 2015-03-27 2021-10-05 Wells Fargo Bank, N.A. Systems and methods for contactless smart card authentication
US11165586B1 (en) 2020-10-30 2021-11-02 Capital One Services, Llc Call center web-based authentication using a contactless card
US11182771B2 (en) 2019-07-17 2021-11-23 Capital One Services, Llc System for value loading onto in-vehicle device
US11200563B2 (en) 2019-12-24 2021-12-14 Capital One Services, Llc Account registration using a contactless card
US11210664B2 (en) 2018-10-02 2021-12-28 Capital One Services, Llc Systems and methods for amplifying the strength of cryptographic algorithms
US11210656B2 (en) 2020-04-13 2021-12-28 Capital One Services, Llc Determining specific terms for contactless card activation
US11216799B1 (en) 2021-01-04 2022-01-04 Capital One Services, Llc Secure generation of one-time passcodes using a contactless card
US11222342B2 (en) 2020-04-30 2022-01-11 Capital One Services, Llc Accurate images in graphical user interfaces to enable data transfer
US11245438B1 (en) 2021-03-26 2022-02-08 Capital One Services, Llc Network-enabled smart apparatus and systems and methods for activating and provisioning same
WO2022046311A1 (en) * 2020-08-24 2022-03-03 Mastercard International Incorporated A multiple payee digital transaction authentication method
US11277394B2 (en) 2016-09-23 2022-03-15 Apple Inc. Managing credentials of multiple users on an electronic device
US11288660B1 (en) 2014-04-30 2022-03-29 Wells Fargo Bank, N.A. Mobile wallet account balance systems and methods
US11295294B1 (en) 2014-04-30 2022-04-05 Wells Fargo Bank, N.A. Mobile wallet account provisioning systems and methods
US11354555B1 (en) 2021-05-04 2022-06-07 Capital One Services, Llc Methods, mediums, and systems for applying a display to a transaction card
US11361302B2 (en) 2019-01-11 2022-06-14 Capital One Services, Llc Systems and methods for touch screen interface interaction using a card overlay
US11373169B2 (en) 2020-11-03 2022-06-28 Capital One Services, Llc Web-based activation of contactless cards
US11392933B2 (en) 2019-07-03 2022-07-19 Capital One Services, Llc Systems and methods for providing online and hybridcard interactions
US11423392B1 (en) 2020-12-01 2022-08-23 Wells Fargo Bank, N.A. Systems and methods for information verification using a contactless card
US11438329B2 (en) 2021-01-29 2022-09-06 Capital One Services, Llc Systems and methods for authenticated peer-to-peer data transfer using resource locators
US11455620B2 (en) 2019-12-31 2022-09-27 Capital One Services, Llc Tapping a contactless card to a computing device to provision a virtual number
US11461766B1 (en) 2014-04-30 2022-10-04 Wells Fargo Bank, N.A. Mobile wallet using tokenized card systems and methods
US11482312B2 (en) 2020-10-30 2022-10-25 Capital One Services, Llc Secure verification of medical status using a contactless card
US11521262B2 (en) 2019-05-28 2022-12-06 Capital One Services, Llc NFC enhanced augmented reality information overlays
US11521213B2 (en) 2019-07-18 2022-12-06 Capital One Services, Llc Continuous authentication for digital services based on contactless card positioning
US11551200B1 (en) 2019-09-18 2023-01-10 Wells Fargo Bank, N.A. Systems and methods for activating a transaction card
US11562358B2 (en) 2021-01-28 2023-01-24 Capital One Services, Llc Systems and methods for near field contactless card communication and cryptographic authentication
US11568389B1 (en) 2014-04-30 2023-01-31 Wells Fargo Bank, N.A. Mobile wallet integration within mobile banking
US11574301B2 (en) 2014-07-11 2023-02-07 Google Llc Hands-free transactions with voice recognition
US11610197B1 (en) 2014-04-30 2023-03-21 Wells Fargo Bank, N.A. Mobile wallet rewards redemption systems and methods
US11615401B1 (en) 2014-04-30 2023-03-28 Wells Fargo Bank, N.A. Mobile wallet authentication systems and methods
US11615395B2 (en) 2019-12-23 2023-03-28 Capital One Services, Llc Authentication for third party digital wallet provisioning
US11637826B2 (en) 2021-02-24 2023-04-25 Capital One Services, Llc Establishing authentication persistence
US11651361B2 (en) 2019-12-23 2023-05-16 Capital One Services, Llc Secure authentication based on passport data stored in a contactless card
US11682012B2 (en) 2021-01-27 2023-06-20 Capital One Services, Llc Contactless delivery systems and methods
US11687930B2 (en) 2021-01-28 2023-06-27 Capital One Services, Llc Systems and methods for authentication of access tokens
US11694187B2 (en) 2019-07-03 2023-07-04 Capital One Services, Llc Constraining transactional capabilities for contactless cards
US11777933B2 (en) 2021-02-03 2023-10-03 Capital One Services, Llc URL-based authentication for payment cards
US11792001B2 (en) 2021-01-28 2023-10-17 Capital One Services, Llc Systems and methods for secure reprovisioning
US11816671B2 (en) * 2018-11-26 2023-11-14 Rtekk Holdings Limited Dynamic verification method and system for card transactions
US11823175B2 (en) 2020-04-30 2023-11-21 Capital One Services, Llc Intelligent card unlock
US11853919B1 (en) 2015-03-04 2023-12-26 Wells Fargo Bank, N.A. Systems and methods for peer-to-peer funds requests
US11863548B2 (en) 2019-09-27 2024-01-02 No Common Payment Ab Generation and verification of a temporary authentication value for use in a secure transmission
US11902442B2 (en) 2021-04-22 2024-02-13 Capital One Services, Llc Secure management of accounts on display devices using a contactless card
US11921836B2 (en) * 2018-04-06 2024-03-05 The Toronto-Dominion Bank Systems for enabling tokenized wearable devices
US11935035B2 (en) 2021-04-20 2024-03-19 Capital One Services, Llc Techniques to utilize resource locators by a contactless card to perform a sequence of operations
US11948134B1 (en) 2019-06-03 2024-04-02 Wells Fargo Bank, N.A. Instant network cash transfer at point of sale
US11961089B2 (en) 2021-04-20 2024-04-16 Capital One Services, Llc On-demand applications to extend web services

Families Citing this family (48)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
BR112013021059A2 (en) * 2011-02-16 2020-10-27 Visa International Service Association Snap mobile payment systems, methods and devices
WO2013006725A2 (en) 2011-07-05 2013-01-10 Visa International Service Association Electronic wallet checkout platform apparatuses, methods and systems
US10242358B2 (en) 2011-08-18 2019-03-26 Visa International Service Association Remote decoupled application persistent state apparatuses, methods and systems
US10825001B2 (en) 2011-08-18 2020-11-03 Visa International Service Association Multi-directional wallet connector apparatuses, methods and systems
US10223730B2 (en) 2011-09-23 2019-03-05 Visa International Service Association E-wallet store injection search apparatuses, methods and systems
US11514435B2 (en) * 2011-10-12 2022-11-29 Boost Payment Solutions, Inc. Electronic payment processing using adjusted interchange rate
US9022286B2 (en) 2013-03-15 2015-05-05 Virtual Electric, Inc. Multi-functional credit card type portable electronic device
US11574300B1 (en) 2014-04-30 2023-02-07 Wells Fargo Bank, N.A. Mobile wallet systems and methods using trace identifier using card networks
US10699274B2 (en) 2015-08-24 2020-06-30 Samsung Electronics Co., Ltd. Apparatus and method for secure electronic payment
US10846696B2 (en) 2015-08-24 2020-11-24 Samsung Electronics Co., Ltd. Apparatus and method for trusted execution environment based secure payment transactions
CA2930705C (en) * 2015-08-27 2019-06-11 Samsung Pay, Inc. Mobile checkout systems and methods
KR102530888B1 (en) * 2015-09-01 2023-05-11 삼성전자주식회사 Electronic device and method for payment transaction
US10420259B2 (en) * 2015-10-05 2019-09-17 Amosense Co., Ltd. Multifunctional hybrid module and portable device comprising same
MX2018004494A (en) 2015-10-12 2018-09-21 Walmart Apollo Llc Re-using e-commerce payment instruments for in-store use systems and methods.
WO2017111271A1 (en) * 2015-12-23 2017-06-29 Lg Electronics Inc. Mobile device and operating method hereof
KR101780566B1 (en) * 2015-12-23 2017-09-21 엘지전자 주식회사 Mobile device and operating method hereof
US10149160B2 (en) 2016-05-11 2018-12-04 Bank Of America Corporation Recognizing and authenticating mobile devices based on unique cross-channel bindings
WO2018034912A1 (en) * 2016-08-19 2018-02-22 Visa International Service Association Automated access data change detection
US10360485B2 (en) * 2016-08-29 2019-07-23 Integrated Device Technology, Inc. Circuits and systems for low power magnetic secure transmission
CN106372895A (en) * 2016-09-12 2017-02-01 北海和思科技有限公司 Community intelligent payment system and method
US11468414B1 (en) 2016-10-03 2022-10-11 Wells Fargo Bank, N.A. Systems and methods for establishing a pull payment relationship
KR102583254B1 (en) 2016-10-27 2023-09-27 삼성전자주식회사 Semiconductor integrated circuit, operating method thereof, and electronic device including including the same
SG10201609753RA (en) 2016-11-21 2018-06-28 Mastercard International Inc System And Method For Stand-In Processing
US20180158052A1 (en) * 2016-12-01 2018-06-07 The Toronto-Dominion Bank Asynchronous cryptogram-based authentication processes
CN108881126B (en) * 2017-05-15 2021-08-31 阿里巴巴集团控股有限公司 Method, device and system for verifying verification code, storage medium and computer terminal
WO2019031717A1 (en) * 2017-08-09 2019-02-14 주식회사 센스톤 Intra-store communication network-based payment system, portable terminal comprising intra-store communication network-based payment function, method for providing intra-store communication network-based payment service, and program for performing same
CN108134667B (en) * 2017-11-15 2021-05-11 中国银联股份有限公司 Method and equipment for generating dynamic credit card security code and bank card
WO2019125611A1 (en) 2017-12-22 2019-06-27 Walmart Apollo, Llc Digital wallet management system
US11295297B1 (en) 2018-02-26 2022-04-05 Wells Fargo Bank, N.A. Systems and methods for pushing usable objects and third-party provisioning to a mobile wallet
CN110223129A (en) * 2018-03-01 2019-09-10 辰伟电子商务有限公司 Building materials net purchase system
JP6466011B1 (en) * 2018-04-13 2019-02-06 クールビックス リミテッド Electronic wallet generation and restoration method
US11074577B1 (en) 2018-05-10 2021-07-27 Wells Fargo Bank, N.A. Systems and methods for making person-to-person payments via mobile client application
US11775955B1 (en) 2018-05-10 2023-10-03 Wells Fargo Bank, N.A. Systems and methods for making person-to-person payments via mobile client application
CN109167666A (en) * 2018-08-31 2019-01-08 深圳众赢维融科技有限公司 Identifying code generation, decryption, method of mobile payment and device
CN110704823A (en) * 2019-09-10 2020-01-17 平安科技(深圳)有限公司 Data request method, device, storage medium and electronic equipment
EP3809352A1 (en) 2019-10-18 2021-04-21 Mastercard International Incorporated Authentication for secure transactions in a multi-server environment
EP3809350A1 (en) * 2019-10-18 2021-04-21 Mastercard International Incorporated Enchanced security in sensitive data transfer over a network
US10949855B2 (en) * 2020-01-14 2021-03-16 Joseph Carlo Pastrana Mathematical constant pi dynamic-hybrid CVV authentication method for credit cards
US10951610B2 (en) * 2020-01-14 2021-03-16 Joseph Carlo Pastrana Operation of mathematical constant PI to authenticate website and computer network users
RU2766134C2 (en) * 2020-02-26 2022-02-08 Акционерное общество "Лаборатория Касперского" Method of anonymously sending data from a user device
EP3933731A1 (en) * 2020-06-30 2022-01-05 Mastercard International Incorporated Authorization data processing for multiple issuers
US20220020002A1 (en) * 2020-07-17 2022-01-20 Home Depot Product Authority, Llc Post payment processing tokenization in merchant payment processing
CN112232825B (en) * 2020-09-02 2022-09-20 厦门鲜品链科技有限公司 POS system for strong identity authentication payment
US11790120B2 (en) 2021-03-26 2023-10-17 Bank Of America Corporation System and method for encrypting storage mediums with an encryption chip
EP4352680A1 (en) * 2021-05-20 2024-04-17 Idex Biometrics Asa Transaction authorization using biometric identity verification
US11810123B1 (en) * 2022-05-10 2023-11-07 Capital One Services, Llc System and method for card present account provisioning
WO2024015537A1 (en) * 2022-07-13 2024-01-18 Capital One Services, Llc Techniques to process contactless card functions in a multiple banking system environment
KR102572349B1 (en) * 2022-08-25 2023-08-29 한국피엠오 주식회사 Management server using virtual account and method thereof

Citations (26)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US3854036A (en) * 1974-02-27 1974-12-10 Singer Co Tag reader to digital processor interface circuit
US5877482A (en) * 1994-06-09 1999-03-02 Reilly; Chris Security system for EFT using magnetic strip cards
US5892900A (en) * 1996-08-30 1999-04-06 Intertrust Technologies Corp. Systems and methods for secure transaction management and electronic rights protection
US6327578B1 (en) * 1998-12-29 2001-12-04 International Business Machines Corporation Four-party credit/debit payment protocol
US6481623B1 (en) * 1998-08-03 2002-11-19 Privicom, Inc. Card reader for transmission of data by sound
US20040133787A1 (en) * 2002-03-28 2004-07-08 Innovation Connection Corporation System, method and apparatus for enabling transactions using a biometrically enabled programmable magnetic stripe
US20060049256A1 (en) * 2004-09-07 2006-03-09 Clay Von Mueller Transparently securing data for transmission on financial networks
US20070136211A1 (en) * 2004-03-15 2007-06-14 Brown Kerry D Financial transactions with dynamic card verification values
US7347361B2 (en) * 2005-06-13 2008-03-25 Robert Lovett System, method and program product for account transaction validation
US20080120236A1 (en) * 2006-11-16 2008-05-22 Patrick Faith Dynamic magnetic stripe
US20080179401A1 (en) * 2007-01-26 2008-07-31 Hart Annmarie D Card reader for use with web based transactions
US20090048953A1 (en) * 2007-08-16 2009-02-19 Patrick Hazel Metrics systems and methods for token transactions
US20090285399A1 (en) * 2008-05-15 2009-11-19 James Paul Schneider Distributing Keypairs Between Network Appliances, Servers, and other Network Assets
US20090317051A1 (en) * 2008-06-18 2009-12-24 Millington Daniel K Mobile Timestamp Systems and Methods of Use
US20100098246A1 (en) * 2008-10-17 2010-04-22 Novell, Inc. Smart card based encryption key and password generation and management
US20120130903A1 (en) * 2002-02-05 2012-05-24 Jack Dorsey Back end of payment system associated with financial transactions using card readers coupled to mobile devices
US20120131680A1 (en) * 2009-07-09 2012-05-24 Tsutomu Baba Detection method for detecting fraud
US20130024372A1 (en) * 2010-03-02 2013-01-24 Spodak Douglas A Portable e-wallet and universal card
US8376239B1 (en) * 2011-07-08 2013-02-19 Thomas David Humphrey Method of use of a simulated magnetic stripe card system for use with magnetic stripe card reading terminals
US8447991B2 (en) * 2006-11-06 2013-05-21 Magtek, Inc. Card authentication system
US8511548B1 (en) * 2008-07-02 2013-08-20 Intuit Inc. Method and system for performing card-based transactions using a portable device
US20140006277A1 (en) * 2011-09-29 2014-01-02 Raj Rao System and method for providing smart electronic wallet and reconfigurable transaction card thereof
US8690059B1 (en) * 2013-01-20 2014-04-08 George Wallner System and method for a baseband nearfield magnetic stripe data transmitter
US8893967B2 (en) * 2009-05-15 2014-11-25 Visa International Service Association Secure Communication of payment information to merchants using a verification token
US20150127547A1 (en) * 2013-10-11 2015-05-07 Glenn Leon Powell Network token system
US20170154334A1 (en) * 2011-02-25 2017-06-01 Diebold Nixdorf, Incorporated Automated teller machine with an encrypting card reader and an encrypting pin pad

Family Cites Families (25)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5834756A (en) 1996-06-03 1998-11-10 Motorola, Inc. Magnetically communicative card
US20030140257A1 (en) * 2002-01-22 2003-07-24 Petr Peterka Encryption, authentication, and key management for multimedia content pre-encryption
US7761374B2 (en) * 2003-08-18 2010-07-20 Visa International Service Association Method and system for generating a dynamic verification value
US7357319B1 (en) 2005-01-24 2008-04-15 Vivotech, Inc. External adapter for magnetic stripe card reader
US7818264B2 (en) * 2006-06-19 2010-10-19 Visa U.S.A. Inc. Track data encryption
CN101098225B (en) * 2006-06-29 2012-07-25 中国银联股份有限公司 Safety data transmission method and paying method, paying terminal and paying server
RU2413991C2 (en) * 2006-09-11 2011-03-10 Фьючер Текнолоджи Инститьют Корпорейшн System for identifying counterfeit cards, apparatus for recording authentication information and apparatus for identifying counterfeit cards
CN101162535B (en) * 2006-10-13 2011-01-12 中国银联股份有限公司 Method and system for realizing magnetic stripe card trading by IC card
US9123042B2 (en) * 2006-10-17 2015-09-01 Verifone, Inc. Pin block replacement
CN101647220A (en) * 2007-02-02 2010-02-10 塞姆泰克创新解决方案公司 The PIN piece is replaced
US10579920B2 (en) * 2007-12-24 2020-03-03 Dynamics Inc. Systems and methods for programmable payment cards and devices with loyalty-based payment applications
US7922082B2 (en) * 2008-01-04 2011-04-12 M2 International Ltd. Dynamic card validation value
US20090218402A1 (en) * 2008-02-29 2009-09-03 Andrew Graham Hodges Apparatus and method for encrypting data in a magnetic stripe reader
US8031207B2 (en) * 2008-06-04 2011-10-04 Mastercard International, Inc. Card image description format to economize on data storage
CN102160061B (en) * 2008-08-20 2014-04-09 X卡控股有限公司 Secure smart card system
WO2011047028A2 (en) * 2009-10-13 2011-04-21 Square, Inc. Systems and methods for financial transaction through miniaturized card reader
US9010646B2 (en) * 2010-04-01 2015-04-21 Coin, Inc. Optical contact loaded magnetic card
JP2012138729A (en) * 2010-12-27 2012-07-19 Kddi Corp Data processing device, program and data processing system
US8925826B2 (en) * 2011-05-03 2015-01-06 Microsoft Corporation Magnetic stripe-based transactions using mobile communication devices
KR101409860B1 (en) 2011-12-13 2014-07-03 주식회사 신한은행 Method and apparatus for providing electronic payment and banking service using smart device and credit card reader
US9165293B2 (en) 2012-03-30 2015-10-20 Mastercard International Incorporated Systems and methods for waveform transmission of transaction card data
US10515359B2 (en) * 2012-04-02 2019-12-24 Mastercard International Incorporated Systems and methods for processing mobile payments by provisioning credentials to mobile devices without secure elements
EP3588342B1 (en) * 2012-06-11 2022-10-12 Samsung Electronics Co., Ltd. Mobile device and control method thereof
US9022285B2 (en) * 2013-03-01 2015-05-05 Looppay, Inc. System and method for securely loading, storing and transmitting magnetic stripe date in a device working with a mobile wallet system
GB2512944A (en) * 2013-04-12 2014-10-15 Mastercard International Inc Systems and methods for outputting information on a display of a mobile device

Patent Citations (27)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US3854036A (en) * 1974-02-27 1974-12-10 Singer Co Tag reader to digital processor interface circuit
US5877482A (en) * 1994-06-09 1999-03-02 Reilly; Chris Security system for EFT using magnetic strip cards
US5892900A (en) * 1996-08-30 1999-04-06 Intertrust Technologies Corp. Systems and methods for secure transaction management and electronic rights protection
US6481623B1 (en) * 1998-08-03 2002-11-19 Privicom, Inc. Card reader for transmission of data by sound
US6327578B1 (en) * 1998-12-29 2001-12-04 International Business Machines Corporation Four-party credit/debit payment protocol
US20120130903A1 (en) * 2002-02-05 2012-05-24 Jack Dorsey Back end of payment system associated with financial transactions using card readers coupled to mobile devices
US20040133787A1 (en) * 2002-03-28 2004-07-08 Innovation Connection Corporation System, method and apparatus for enabling transactions using a biometrically enabled programmable magnetic stripe
US20070136211A1 (en) * 2004-03-15 2007-06-14 Brown Kerry D Financial transactions with dynamic card verification values
US20060049256A1 (en) * 2004-09-07 2006-03-09 Clay Von Mueller Transparently securing data for transmission on financial networks
US7347361B2 (en) * 2005-06-13 2008-03-25 Robert Lovett System, method and program product for account transaction validation
US8447991B2 (en) * 2006-11-06 2013-05-21 Magtek, Inc. Card authentication system
US20080120236A1 (en) * 2006-11-16 2008-05-22 Patrick Faith Dynamic magnetic stripe
US20080179401A1 (en) * 2007-01-26 2008-07-31 Hart Annmarie D Card reader for use with web based transactions
US20090048953A1 (en) * 2007-08-16 2009-02-19 Patrick Hazel Metrics systems and methods for token transactions
US20090285399A1 (en) * 2008-05-15 2009-11-19 James Paul Schneider Distributing Keypairs Between Network Appliances, Servers, and other Network Assets
US20090317051A1 (en) * 2008-06-18 2009-12-24 Millington Daniel K Mobile Timestamp Systems and Methods of Use
US8511548B1 (en) * 2008-07-02 2013-08-20 Intuit Inc. Method and system for performing card-based transactions using a portable device
US20100098246A1 (en) * 2008-10-17 2010-04-22 Novell, Inc. Smart card based encryption key and password generation and management
US8893967B2 (en) * 2009-05-15 2014-11-25 Visa International Service Association Secure Communication of payment information to merchants using a verification token
US20150134537A1 (en) * 2009-05-15 2015-05-14 Ayman Hammad Secure communication of payment information to merchants using a verification token
US20120131680A1 (en) * 2009-07-09 2012-05-24 Tsutomu Baba Detection method for detecting fraud
US20130024372A1 (en) * 2010-03-02 2013-01-24 Spodak Douglas A Portable e-wallet and universal card
US20170154334A1 (en) * 2011-02-25 2017-06-01 Diebold Nixdorf, Incorporated Automated teller machine with an encrypting card reader and an encrypting pin pad
US8376239B1 (en) * 2011-07-08 2013-02-19 Thomas David Humphrey Method of use of a simulated magnetic stripe card system for use with magnetic stripe card reading terminals
US20140006277A1 (en) * 2011-09-29 2014-01-02 Raj Rao System and method for providing smart electronic wallet and reconfigurable transaction card thereof
US8690059B1 (en) * 2013-01-20 2014-04-08 George Wallner System and method for a baseband nearfield magnetic stripe data transmitter
US20150127547A1 (en) * 2013-10-11 2015-05-07 Glenn Leon Powell Network token system

Cited By (236)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US10516658B2 (en) 2013-12-16 2019-12-24 Mbr Innovations Llc Systems and methods for verifying attributes of users of online systems
US10212148B2 (en) 2013-12-16 2019-02-19 Mbr Innovations Llc Systems and methods for verifying attributes of users of online systems
US10078840B2 (en) * 2014-04-28 2018-09-18 Mastercard International Incorporated Method for generating and updating alternate security codes for payment cards
US20150310439A1 (en) * 2014-04-28 2015-10-29 Mastercard International Incorporated Method for generating and updating alternate security codes for payment cards
US11587058B1 (en) 2014-04-30 2023-02-21 Wells Fargo Bank, N.A. Mobile wallet integration within mobile banking
US11568389B1 (en) 2014-04-30 2023-01-31 Wells Fargo Bank, N.A. Mobile wallet integration within mobile banking
US11748736B1 (en) 2014-04-30 2023-09-05 Wells Fargo Bank, N.A. Mobile wallet integration within mobile banking
US11645647B1 (en) 2014-04-30 2023-05-09 Wells Fargo Bank, N.A. Mobile wallet account balance systems and methods
US11935045B1 (en) 2014-04-30 2024-03-19 Wells Fargo Bank, N.A. Mobile wallet account provisioning systems and methods
US11615401B1 (en) 2014-04-30 2023-03-28 Wells Fargo Bank, N.A. Mobile wallet authentication systems and methods
US11610197B1 (en) 2014-04-30 2023-03-21 Wells Fargo Bank, N.A. Mobile wallet rewards redemption systems and methods
US11593789B1 (en) 2014-04-30 2023-02-28 Wells Fargo Bank, N.A. Mobile wallet account provisioning systems and methods
US11295294B1 (en) 2014-04-30 2022-04-05 Wells Fargo Bank, N.A. Mobile wallet account provisioning systems and methods
US11928668B1 (en) 2014-04-30 2024-03-12 Wells Fargo Bank, N.A. Mobile wallet using tokenized card systems and methods
US10997592B1 (en) 2014-04-30 2021-05-04 Wells Fargo Bank, N.A. Mobile wallet account balance systems and methods
US11651351B1 (en) 2014-04-30 2023-05-16 Wells Fargo Bank, N.A. Mobile wallet account provisioning systems and methods
US11663599B1 (en) 2014-04-30 2023-05-30 Wells Fargo Bank, N.A. Mobile wallet authentication systems and methods
US11288660B1 (en) 2014-04-30 2022-03-29 Wells Fargo Bank, N.A. Mobile wallet account balance systems and methods
US11423393B1 (en) 2014-04-30 2022-08-23 Wells Fargo Bank, N.A. Mobile wallet account balance systems and methods
US11461766B1 (en) 2014-04-30 2022-10-04 Wells Fargo Bank, N.A. Mobile wallet using tokenized card systems and methods
US20150348044A1 (en) * 2014-05-30 2015-12-03 Verizon Patent And Licensing Inc. Secure credit card transactions based on a mobile device
US11574301B2 (en) 2014-07-11 2023-02-07 Google Llc Hands-free transactions with voice recognition
US10460317B2 (en) 2014-07-11 2019-10-29 Google Llc Hands-free transaction tokens via payment processor
US11132693B1 (en) 2014-08-14 2021-09-28 Wells Fargo Bank, N.A. Use limitations for secondary users of financial accounts
US20160132881A1 (en) * 2014-11-12 2016-05-12 Samsung Electronics Co., Ltd. Apparatus and method for payment
US20160162883A1 (en) * 2014-12-04 2016-06-09 Mastercard International Incorporated Methods and apparatus for conducting secure magnetic stripe card transactions with a proximity payment device
US11620654B2 (en) * 2014-12-04 2023-04-04 Mastercard International Incorporated Methods and apparatus for conducting secure magnetic stripe card transactions with a proximity payment device
US11182769B2 (en) * 2015-02-12 2021-11-23 Samsung Electronics Co., Ltd. Payment processing method and electronic device supporting the same
US20160247144A1 (en) * 2015-02-12 2016-08-25 Samsung Electronics Co., Ltd. Payment processing method and electronic device supporting the same
US11107047B2 (en) 2015-02-27 2021-08-31 Samsung Electronics Co., Ltd. Electronic device providing electronic payment function and operating method thereof
US11129018B2 (en) 2015-02-27 2021-09-21 Samsung Electronics Co., Ltd. Payment means operation supporting method and electronic device for supporting the same
US11853919B1 (en) 2015-03-04 2023-12-26 Wells Fargo Bank, N.A. Systems and methods for peer-to-peer funds requests
US11037139B1 (en) 2015-03-19 2021-06-15 Wells Fargo Bank, N.A. Systems and methods for smart card mobile device authentication
US11138593B1 (en) 2015-03-27 2021-10-05 Wells Fargo Bank, N.A. Systems and methods for contactless smart card authentication
US11188919B1 (en) 2015-03-27 2021-11-30 Wells Fargo Bank, N.A. Systems and methods for contactless smart card authentication
US20160308587A1 (en) * 2015-04-14 2016-10-20 Sang-Hyo Lee Near field communication package and portable device including the same
US10651897B2 (en) * 2015-04-14 2020-05-12 Samsung Electronics Co., Ltd Near field communication package and portable device including the same
US11836710B2 (en) * 2015-04-17 2023-12-05 Jpmorgan Chase Bank, N.A. Systems and methods for facilitating payment application provisioning and transacting
US20210081929A1 (en) * 2015-04-17 2021-03-18 Jpmorgan Chase Bank, N.A. Systems and methods for facilitating payment application provisioning and transacting
US20160328341A1 (en) * 2015-05-07 2016-11-10 Broadcom Corporation Near Field Communication (NFC) Enabled Peripheral Device
US9965411B2 (en) * 2015-05-07 2018-05-08 Avago Technologies General Ip (Singapore) Pte. Ltd. Near field communication (NFC) enabled peripheral device
US20160345125A1 (en) * 2015-05-21 2016-11-24 Samsung Electronics Co., Ltd. Electronic device and method for performing wireless communication thereof
US10410205B2 (en) * 2015-08-21 2019-09-10 Samsung Electronics Co., Ltd. Apparatus and method for performing payment transaction using dynamic MST configuration
US10395236B2 (en) * 2015-10-20 2019-08-27 Lg Electronics Inc. Mobile terminal and method for controlling the same
US20190005490A1 (en) * 2015-12-22 2019-01-03 Idemia France Authentication method
US10909530B2 (en) * 2015-12-22 2021-02-02 Idemia France Authentication method
WO2017142135A1 (en) * 2016-02-15 2017-08-24 엘지전자 주식회사 Mobile terminal
US10482463B2 (en) 2016-03-01 2019-11-19 Google Llc Facial profile modification for hands free transactions
US10839393B2 (en) 2016-03-01 2020-11-17 Google Llc Facial profile modification for hands free transactions
US20170255923A1 (en) * 2016-03-01 2017-09-07 Google Inc. Direct settlement of hands-free transactions
US10996708B2 (en) * 2016-03-08 2021-05-04 Thales Dis France Sa Method to compensate by a server a clock deviation of a card
US10902402B2 (en) 2016-04-08 2021-01-26 Samsung Electronics Co., Ltd. Portable device and electronic payment method of portable device
EP3440610A4 (en) * 2016-04-08 2019-04-10 Samsung Electronics Co., Ltd. Portable device and electronic payment method of portable device
CN109074573A (en) * 2016-04-08 2018-12-21 三星电子株式会社 The electric paying method of portable unit and portable unit
US20170300904A1 (en) * 2016-04-15 2017-10-19 Samsung Electronics Co., Ltd. Electronic device and payment method using the same
US11062302B1 (en) * 2016-04-22 2021-07-13 Wells Fargo Bank, N.A. Systems and methods for mobile wallet provisioning
US11631076B1 (en) 2016-04-22 2023-04-18 Wells Fargo Bank, N.A. Systems and methods for mobile wallet provisioning
US11113688B1 (en) * 2016-04-22 2021-09-07 Wells Fargo Bank, N.A. Systems and methods for mobile wallet provisioning
US10417630B2 (en) 2016-07-28 2019-09-17 Samsung Electronics Co., Ltd. Transmission-pulse sequence including proxy for secondary magnetic stripe
WO2018022459A1 (en) * 2016-07-28 2018-02-01 Samsung Pay, Inc. Transmission-pulse sequence including proxy for secondary magnetic stripe
US11495051B2 (en) 2016-07-31 2022-11-08 Google Llc Automatic hands free service requests
US10474879B2 (en) 2016-07-31 2019-11-12 Google Llc Automatic hands free service requests
EP3507756A4 (en) * 2016-08-30 2020-01-22 No Common Payment AB Generation and verification of a temporary card security code for use in card based transactions
US11216817B2 (en) * 2016-08-30 2022-01-04 No Common Payment Ab Generation and verification of a temporary card security code for use in card based transactions
US11277394B2 (en) 2016-09-23 2022-03-15 Apple Inc. Managing credentials of multiple users on an electronic device
EP3333791A1 (en) * 2016-12-12 2018-06-13 Gemalto Sa Method for generating a cryptogram in a user device and verifying this cryptogram in a payment server, corresponding user device and payment server
WO2018108737A1 (en) * 2016-12-12 2018-06-21 Gemalto Sa Method for generating a cryptogram in a user device and verifying this cryptogram in a payment server, corresponding user device and payment server
US10796297B2 (en) 2017-01-03 2020-10-06 Samsung Electronics Co., Ltd. Method and electronic device for secure magnetic pulse transmission
US20180232725A1 (en) * 2017-02-14 2018-08-16 Its, Inc. Payment tokenization using separate token vault
US20200226608A1 (en) * 2017-05-25 2020-07-16 Mir Limited Dynamic verification method and system for card transactions
CN110546668A (en) * 2017-05-25 2019-12-06 美尔有限公司 Dynamic authentication method and system for card transaction
WO2018216001A1 (en) * 2017-05-25 2018-11-29 Mir Limited Dynamic verification method and system for card transactions
US11769148B2 (en) * 2017-10-05 2023-09-26 The Toronto-Dominion Bank System and method of session key generation and exchange
US20210174362A1 (en) * 2017-10-05 2021-06-10 The Toronto-Dominion Bank System and method of session key generation and exchange
US11921836B2 (en) * 2018-04-06 2024-03-05 The Toronto-Dominion Bank Systems for enabling tokenized wearable devices
US10546444B2 (en) 2018-06-21 2020-01-28 Capital One Services, Llc Systems and methods for secure read-only authentication
US10878651B2 (en) 2018-06-21 2020-12-29 Capital One Services, Llc Systems and methods for secure read-only authentication
US10778437B2 (en) 2018-10-02 2020-09-15 Capital One Services, Llc Systems and methods for cryptographic authentication of contactless cards
US11502844B2 (en) 2018-10-02 2022-11-15 Capital One Services, Llc Systems and methods for cryptographic authentication of contactless cards
US10783519B2 (en) 2018-10-02 2020-09-22 Capital One Services, Llc Systems and methods for cryptographic authentication of contactless cards
US10797882B2 (en) 2018-10-02 2020-10-06 Capital One Services, Llc Systems and methods for cryptographic authentication of contactless cards
US11699047B2 (en) 2018-10-02 2023-07-11 Capital One Services, Llc Systems and methods for contactless card applet communication
US11341480B2 (en) 2018-10-02 2022-05-24 Capital One Services, Llc Systems and methods for phone-based card activation
US10841091B2 (en) 2018-10-02 2020-11-17 Capital One Services, Llc Systems and methods for cryptographic authentication of contactless cards
US10771253B2 (en) 2018-10-02 2020-09-08 Capital One Services, Llc Systems and methods for cryptographic authentication of contactless cards
US11658997B2 (en) 2018-10-02 2023-05-23 Capital One Services, Llc Systems and methods for signaling an attack on contactless cards
US10771254B2 (en) 2018-10-02 2020-09-08 Capital One Services, Llc Systems and methods for email-based card activation
US10860814B2 (en) 2018-10-02 2020-12-08 Capital One Services, Llc Systems and methods for cryptographic authentication of contactless cards
US10748138B2 (en) 2018-10-02 2020-08-18 Capital One Services, Llc Systems and methods for cryptographic authentication of contactless cards
US10733645B2 (en) 2018-10-02 2020-08-04 Capital One Services, Llc Systems and methods for establishing identity for order pick up
US10880327B2 (en) 2018-10-02 2020-12-29 Capital One Services, Llc Systems and methods for signaling an attack on contactless cards
US11770254B2 (en) 2018-10-02 2023-09-26 Capital One Services, Llc Systems and methods for cryptographic authentication of contactless cards
US11784820B2 (en) 2018-10-02 2023-10-10 Capital One Services, Llc Systems and methods for cryptographic authentication of contactless cards
US10887106B2 (en) 2018-10-02 2021-01-05 Capital One Services, Llc Systems and methods for cryptographic authentication of contactless cards
US11790187B2 (en) 2018-10-02 2023-10-17 Capital One Services, Llc Systems and methods for data transmission using contactless cards
US11336454B2 (en) 2018-10-02 2022-05-17 Capital One Services, Llc Systems and methods for cryptographic authentication of contactless cards
US10685350B2 (en) 2018-10-02 2020-06-16 Capital One Services, Llc Systems and methods for cryptographic authentication of contactless cards
US10686603B2 (en) 2018-10-02 2020-06-16 Capital One Services, Llc Systems and methods for cryptographic authentication of contactless cards
US10909527B2 (en) 2018-10-02 2021-02-02 Capital One Services, Llc Systems and methods for performing a reissue of a contactless card
US11610195B2 (en) 2018-10-02 2023-03-21 Capital One Services, Llc Systems and methods for cryptographic authentication of contactless cards
US10949520B2 (en) 2018-10-02 2021-03-16 Capital One Services, Llc Systems and methods for cross coupling risk analytics and one-time-passcodes
US10680824B2 (en) 2018-10-02 2020-06-09 Capital One Services, Llc Systems and methods for inventory management using cryptographic authentication of contactless cards
US10965465B2 (en) 2018-10-02 2021-03-30 Capital One Services, Llc Systems and methods for cryptographic authentication of contactless cards
US11804964B2 (en) 2018-10-02 2023-10-31 Capital One Services, Llc Systems and methods for cryptographic authentication of contactless cards
US11321546B2 (en) 2018-10-02 2022-05-03 Capital One Services, Llc Systems and methods data transmission using contactless cards
US10630653B1 (en) 2018-10-02 2020-04-21 Capital One Services, Llc Systems and methods for cryptographic authentication of contactless cards
US10992477B2 (en) 2018-10-02 2021-04-27 Capital One Services, Llc Systems and methods for cryptographic authentication of contactless cards
US10623393B1 (en) 2018-10-02 2020-04-14 Capital One Services, Llc Systems and methods for cryptographic authentication of contactless cards
US10615981B1 (en) 2018-10-02 2020-04-07 Capital One Services, Llc Systems and methods for cryptographic authentication of contactless cards
US10607216B1 (en) 2018-10-02 2020-03-31 Capital One Services, Llc Systems and methods for cryptographic authentication of contactless cards
US10607214B1 (en) 2018-10-02 2020-03-31 Capital One Services, Llc Systems and methods for cryptographic authentication of contactless cards
US11563583B2 (en) 2018-10-02 2023-01-24 Capital One Services, Llc Systems and methods for content management using contactless cards
US10592710B1 (en) 2018-10-02 2020-03-17 Capital One Services, Llc Systems and methods for cryptographic authentication of contactless cards
US11301848B2 (en) 2018-10-02 2022-04-12 Capital One Services, Llc Systems and methods for secure transaction approval
US11544707B2 (en) 2018-10-02 2023-01-03 Capital One Services, Llc Systems and methods for cryptographic authentication of contactless cards
US10579998B1 (en) 2018-10-02 2020-03-03 Capital One Services, Llc Systems and methods for cryptographic authentication of contactless cards
US11728994B2 (en) 2018-10-02 2023-08-15 Capital One Services, Llc Systems and methods for cryptographic authentication of contactless cards
US10581611B1 (en) 2018-10-02 2020-03-03 Capital One Services, Llc Systems and methods for cryptographic authentication of contactless cards
US11102007B2 (en) 2018-10-02 2021-08-24 Capital One Services, Llc Contactless card emulation system and method
US10582386B1 (en) 2018-10-02 2020-03-03 Capital One Services, Llc Systems and methods for cryptographic authentication of contactless cards
US10565587B1 (en) 2018-10-02 2020-02-18 Capital One Services, Llc Systems and methods for cryptographic authentication of contactless cards
US10554411B1 (en) 2018-10-02 2020-02-04 Capital One Services, Llc Systems and methods for cryptographic authentication of contactless cards
US11469898B2 (en) 2018-10-02 2022-10-11 Capital One Services, Llc Systems and methods for message presentation using contactless cards
US11297046B2 (en) 2018-10-02 2022-04-05 Capital One Services, Llc Systems and methods for cryptographic authentication of contactless cards
US11129019B2 (en) 2018-10-02 2021-09-21 Capital One Services, Llc Systems and methods for performing transactions with contactless cards
US10542036B1 (en) 2018-10-02 2020-01-21 Capital One Services, Llc Systems and methods for signaling an attack on contactless cards
US11843698B2 (en) 2018-10-02 2023-12-12 Capital One Services, Llc Systems and methods of key selection for cryptographic authentication of contactless cards
US11843700B2 (en) 2018-10-02 2023-12-12 Capital One Services, Llc Systems and methods for email-based card activation
US11144915B2 (en) 2018-10-02 2021-10-12 Capital One Services, Llc Systems and methods for cryptographic authentication of contactless cards using risk factors
US10489781B1 (en) 2018-10-02 2019-11-26 Capital One Services, Llc Systems and methods for cryptographic authentication of contactless cards
US11182784B2 (en) 2018-10-02 2021-11-23 Capital One Services, Llc Systems and methods for performing transactions with contactless cards
US11456873B2 (en) 2018-10-02 2022-09-27 Capital One Services, Llc Systems and methods for cryptographic authentication of contactless cards
US11349667B2 (en) 2018-10-02 2022-05-31 Capital One Services, Llc Systems and methods for inventory management using cryptographic authentication of contactless cards
US11182785B2 (en) 2018-10-02 2021-11-23 Capital One Services, Llc Systems and methods for authorization and access to services using contactless cards
US10511443B1 (en) 2018-10-02 2019-12-17 Capital One Services, Llc Systems and methods for cryptographic authentication of contactless cards
US11195174B2 (en) 2018-10-02 2021-12-07 Capital One Services, Llc Systems and methods for cryptographic authentication of contactless cards
US11924188B2 (en) 2018-10-02 2024-03-05 Capital One Services, Llc Systems and methods for cryptographic authentication of contactless cards
US11210664B2 (en) 2018-10-02 2021-12-28 Capital One Services, Llc Systems and methods for amplifying the strength of cryptographic algorithms
US11444775B2 (en) 2018-10-02 2022-09-13 Capital One Services, Llc Systems and methods for content management using contactless cards
US10505738B1 (en) 2018-10-02 2019-12-10 Capital One Services, Llc Systems and methods for cryptographic authentication of contactless cards
US11438164B2 (en) 2018-10-02 2022-09-06 Capital One Services, Llc Systems and methods for email-based card activation
US11438311B2 (en) 2018-10-02 2022-09-06 Capital One Services, Llc Systems and methods for card information management
US11233645B2 (en) 2018-10-02 2022-01-25 Capital One Services, Llc Systems and methods of key selection for cryptographic authentication of contactless cards
US11232272B2 (en) 2018-10-02 2022-01-25 Capital One Services, Llc Systems and methods for contactless card applet communication
US11423452B2 (en) 2018-10-02 2022-08-23 Capital One Services, Llc Systems and methods for establishing identity for order pick up
US11816671B2 (en) * 2018-11-26 2023-11-14 Rtekk Holdings Limited Dynamic verification method and system for card transactions
US11450160B2 (en) 2018-12-13 2022-09-20 Carrier Corporation Wireless access control using an electromagnet
WO2020123580A1 (en) * 2018-12-13 2020-06-18 Carrier Corporation Wireless access control using an electromagnet
US11361302B2 (en) 2019-01-11 2022-06-14 Capital One Services, Llc Systems and methods for touch screen interface interaction using a card overlay
US11037136B2 (en) 2019-01-24 2021-06-15 Capital One Services, Llc Tap to autofill card data
US10510074B1 (en) 2019-02-01 2019-12-17 Capital One Services, Llc One-tap payment using a contactless card
US10467622B1 (en) 2019-02-01 2019-11-05 Capital One Services, Llc Using on-demand applications to generate virtual numbers for a contactless card to securely autofill forms
US11120453B2 (en) 2019-02-01 2021-09-14 Capital One Services, Llc Tap card to securely generate card data to copy to clipboard
US10425129B1 (en) 2019-02-27 2019-09-24 Capital One Services, Llc Techniques to reduce power consumption in near field communication systems
US10523708B1 (en) 2019-03-18 2019-12-31 Capital One Services, Llc System and method for second factor authentication of customer support calls
US11069173B2 (en) * 2019-03-20 2021-07-20 Capital One Services, Llc Tap to copy data to clipboard via NFC
US10783736B1 (en) 2019-03-20 2020-09-22 Capital One Services, Llc Tap to copy data to clipboard via NFC
US10643420B1 (en) 2019-03-20 2020-05-05 Capital One Services, Llc Contextual tapping engine
US10535062B1 (en) 2019-03-20 2020-01-14 Capital One Services, Llc Using a contactless card to securely share personal data stored in a blockchain
US10984416B2 (en) 2019-03-20 2021-04-20 Capital One Services, Llc NFC mobile currency transfer
US10438437B1 (en) * 2019-03-20 2019-10-08 Capital One Services, Llc Tap to copy data to clipboard via NFC
US10970712B2 (en) 2019-03-21 2021-04-06 Capital One Services, Llc Delegated administration of permissions using a contactless card
US10467445B1 (en) 2019-03-28 2019-11-05 Capital One Services, Llc Devices and methods for contactless card alignment with a foldable mobile device
US11521262B2 (en) 2019-05-28 2022-12-06 Capital One Services, Llc NFC enhanced augmented reality information overlays
US11948134B1 (en) 2019-06-03 2024-04-02 Wells Fargo Bank, N.A. Instant network cash transfer at point of sale
US10516447B1 (en) 2019-06-17 2019-12-24 Capital One Services, Llc Dynamic power levels in NFC card communications
US10871958B1 (en) 2019-07-03 2020-12-22 Capital One Services, Llc Techniques to perform applet programming
US11392933B2 (en) 2019-07-03 2022-07-19 Capital One Services, Llc Systems and methods for providing online and hybridcard interactions
US11694187B2 (en) 2019-07-03 2023-07-04 Capital One Services, Llc Constraining transactional capabilities for contactless cards
US10713649B1 (en) 2019-07-09 2020-07-14 Capital One Services, Llc System and method enabling mobile near-field communication to update display on a payment card
US10885514B1 (en) 2019-07-15 2021-01-05 Capital One Services, Llc System and method for using image data to trigger contactless card transactions
US10498401B1 (en) 2019-07-15 2019-12-03 Capital One Services, Llc System and method for guiding card positioning using phone sensors
US10832271B1 (en) 2019-07-17 2020-11-10 Capital One Services, Llc Verified reviews using a contactless card
US11182771B2 (en) 2019-07-17 2021-11-23 Capital One Services, Llc System for value loading onto in-vehicle device
US10733601B1 (en) 2019-07-17 2020-08-04 Capital One Services, Llc Body area network facilitated authentication or payment authorization
US11521213B2 (en) 2019-07-18 2022-12-06 Capital One Services, Llc Continuous authentication for digital services based on contactless card positioning
US10506426B1 (en) 2019-07-19 2019-12-10 Capital One Services, Llc Techniques for call authentication
US10541995B1 (en) 2019-07-23 2020-01-21 Capital One Services, Llc First factor contactless card authentication system and method
US11694188B1 (en) 2019-09-18 2023-07-04 Wells Fargo Bank, N.A. Systems and methods for contactless card activation
US11941608B1 (en) 2019-09-18 2024-03-26 Wells Fargo Bank, N.A. Systems and methods for a transaction card having a customer-specific URL
US11551200B1 (en) 2019-09-18 2023-01-10 Wells Fargo Bank, N.A. Systems and methods for activating a transaction card
US11928666B1 (en) 2019-09-18 2024-03-12 Wells Fargo Bank, N.A. Systems and methods for passwordless login via a contactless card
US11599871B1 (en) 2019-09-18 2023-03-07 Wells Fargo Bank, N.A. Systems and methods for a transaction card having a cryptographic key
US11863548B2 (en) 2019-09-27 2024-01-02 No Common Payment Ab Generation and verification of a temporary authentication value for use in a secure transmission
US10701560B1 (en) 2019-10-02 2020-06-30 Capital One Services, Llc Client device authentication using contactless legacy magnetic stripe data
US11638148B2 (en) 2019-10-02 2023-04-25 Capital One Services, Llc Client device authentication using contactless legacy magnetic stripe data
US10733283B1 (en) 2019-12-23 2020-08-04 Capital One Services, Llc Secure password generation and management using NFC and contactless smart cards
US11113685B2 (en) 2019-12-23 2021-09-07 Capital One Services, Llc Card issuing with restricted virtual numbers
US11941607B2 (en) * 2019-12-23 2024-03-26 Capital One Services, Llc Card issuing with restricted virtual numbers
US11651361B2 (en) 2019-12-23 2023-05-16 Capital One Services, Llc Secure authentication based on passport data stored in a contactless card
US10862540B1 (en) 2019-12-23 2020-12-08 Capital One Services, Llc Method for mapping NFC field strength and location on mobile devices
US10657754B1 (en) 2019-12-23 2020-05-19 Capital One Services, Llc Contactless card and personal identification system
US11615395B2 (en) 2019-12-23 2023-03-28 Capital One Services, Llc Authentication for third party digital wallet provisioning
US10885410B1 (en) 2019-12-23 2021-01-05 Capital One Services, Llc Generating barcodes utilizing cryptographic techniques
US20220027889A1 (en) * 2019-12-23 2022-01-27 Capital One Services, Llc Card issuing with restricted virtual numbers
US10853795B1 (en) 2019-12-24 2020-12-01 Capital One Services, Llc Secure authentication based on identity data stored in a contactless card
US10664941B1 (en) 2019-12-24 2020-05-26 Capital One Services, Llc Steganographic image encoding of biometric template information on a card
US11200563B2 (en) 2019-12-24 2021-12-14 Capital One Services, Llc Account registration using a contactless card
US10757574B1 (en) 2019-12-26 2020-08-25 Capital One Services, Llc Multi-factor authentication providing a credential via a contactless card for secure messaging
US10909544B1 (en) 2019-12-26 2021-02-02 Capital One Services, Llc Accessing and utilizing multiple loyalty point accounts
US11038688B1 (en) 2019-12-30 2021-06-15 Capital One Services, Llc Techniques to control applets for contactless cards
US10860914B1 (en) 2019-12-31 2020-12-08 Capital One Services, Llc Contactless card and method of assembly
US11455620B2 (en) 2019-12-31 2022-09-27 Capital One Services, Llc Tapping a contactless card to a computing device to provision a virtual number
US11210656B2 (en) 2020-04-13 2021-12-28 Capital One Services, Llc Determining specific terms for contactless card activation
US11222342B2 (en) 2020-04-30 2022-01-11 Capital One Services, Llc Accurate images in graphical user interfaces to enable data transfer
US11823175B2 (en) 2020-04-30 2023-11-21 Capital One Services, Llc Intelligent card unlock
US11562346B2 (en) 2020-04-30 2023-01-24 Capital One Services, Llc Contactless card with multiple rotating security keys
US10915888B1 (en) 2020-04-30 2021-02-09 Capital One Services, Llc Contactless card with multiple rotating security keys
US10861006B1 (en) 2020-04-30 2020-12-08 Capital One Services, Llc Systems and methods for data access control using a short-range transceiver
US11030339B1 (en) 2020-04-30 2021-06-08 Capital One Services, Llc Systems and methods for data access control of personal user data using a short-range transceiver
US11270291B2 (en) 2020-04-30 2022-03-08 Capital One Services, Llc Systems and methods for data access control using a short-range transceiver
US10963865B1 (en) 2020-05-12 2021-03-30 Capital One Services, Llc Augmented reality card activation experience
US11063979B1 (en) 2020-05-18 2021-07-13 Capital One Services, Llc Enabling communications between applications in a mobile operating system
US11100511B1 (en) 2020-05-18 2021-08-24 Capital One Services, Llc Application-based point of sale system in mobile operating systems
US11062098B1 (en) 2020-08-11 2021-07-13 Capital One Services, Llc Augmented reality information display and interaction via NFC based authentication
WO2022046311A1 (en) * 2020-08-24 2022-03-03 Mastercard International Incorporated A multiple payee digital transaction authentication method
US11165586B1 (en) 2020-10-30 2021-11-02 Capital One Services, Llc Call center web-based authentication using a contactless card
US11482312B2 (en) 2020-10-30 2022-10-25 Capital One Services, Llc Secure verification of medical status using a contactless card
US11373169B2 (en) 2020-11-03 2022-06-28 Capital One Services, Llc Web-based activation of contactless cards
US11423392B1 (en) 2020-12-01 2022-08-23 Wells Fargo Bank, N.A. Systems and methods for information verification using a contactless card
US11216799B1 (en) 2021-01-04 2022-01-04 Capital One Services, Llc Secure generation of one-time passcodes using a contactless card
US11682012B2 (en) 2021-01-27 2023-06-20 Capital One Services, Llc Contactless delivery systems and methods
US11687930B2 (en) 2021-01-28 2023-06-27 Capital One Services, Llc Systems and methods for authentication of access tokens
US11792001B2 (en) 2021-01-28 2023-10-17 Capital One Services, Llc Systems and methods for secure reprovisioning
US11922417B2 (en) 2021-01-28 2024-03-05 Capital One Services, Llc Systems and methods for near field contactless card communication and cryptographic authentication
US11562358B2 (en) 2021-01-28 2023-01-24 Capital One Services, Llc Systems and methods for near field contactless card communication and cryptographic authentication
US11438329B2 (en) 2021-01-29 2022-09-06 Capital One Services, Llc Systems and methods for authenticated peer-to-peer data transfer using resource locators
US11777933B2 (en) 2021-02-03 2023-10-03 Capital One Services, Llc URL-based authentication for payment cards
US11637826B2 (en) 2021-02-24 2023-04-25 Capital One Services, Llc Establishing authentication persistence
US11848724B2 (en) 2021-03-26 2023-12-19 Capital One Services, Llc Network-enabled smart apparatus and systems and methods for activating and provisioning same
US11245438B1 (en) 2021-03-26 2022-02-08 Capital One Services, Llc Network-enabled smart apparatus and systems and methods for activating and provisioning same
US20220311475A1 (en) 2021-03-26 2022-09-29 Capital One Services, Llc Network-enabled smart apparatus and systems and methods for activating and provisioning same
US11961089B2 (en) 2021-04-20 2024-04-16 Capital One Services, Llc On-demand applications to extend web services
US11935035B2 (en) 2021-04-20 2024-03-19 Capital One Services, Llc Techniques to utilize resource locators by a contactless card to perform a sequence of operations
US11902442B2 (en) 2021-04-22 2024-02-13 Capital One Services, Llc Secure management of accounts on display devices using a contactless card
US11354555B1 (en) 2021-05-04 2022-06-07 Capital One Services, Llc Methods, mediums, and systems for applying a display to a transaction card

Also Published As

Publication number Publication date
SG10201702208RA (en) 2017-04-27
HK1211724A1 (en) 2016-05-27
RU2016118742A (en) 2017-11-20
HK1223179A1 (en) 2017-07-21
AU2015219276A1 (en) 2016-05-05
EP3113095A1 (en) 2017-01-04
CN105701661B (en) 2020-03-24
KR20160077171A (en) 2016-07-01
JP6214724B2 (en) 2017-10-18
EP3061056B1 (en) 2021-12-15
WO2015126753A1 (en) 2015-08-27
RU2648944C2 (en) 2018-03-28
WO2015126753A9 (en) 2015-10-15
AU2015219276B2 (en) 2017-06-22
CA2927113A1 (en) 2015-08-27
AU2016202504B2 (en) 2017-09-21
JP2017055385A (en) 2017-03-16
CN105701661A (en) 2016-06-22
JP6263624B2 (en) 2018-01-17
CA2927113C (en) 2019-09-10
JP2017502582A (en) 2017-01-19
EP3061056A4 (en) 2017-04-05
KR101815430B1 (en) 2018-01-04
AU2016202504A1 (en) 2016-05-12
EP3061056A1 (en) 2016-08-31
SG11201602941WA (en) 2016-05-30
US20160125417A1 (en) 2016-05-05
US9864994B2 (en) 2018-01-09
KR20170040382A (en) 2017-04-12
CN105027153A (en) 2015-11-04
KR101784125B1 (en) 2017-10-10

Similar Documents

Publication Publication Date Title
US9864994B2 (en) Terminal for magnetic secure transmission
US10826702B2 (en) Secure authentication of user and mobile device
US11188901B2 (en) Secure remote payment transaction processing using a secure element
CN105745678B (en) Secure remote payment transaction processing including consumer authentication
CN112805737A (en) Techniques for token proximity transactions
JP2019507431A (en) Authentication system and method using location verification
JP2018522353A (en) Authentication system and method for server-based payment
WO2024077127A1 (en) Messaging flow for remote interactions using secure data

Legal Events

Date Code Title Description
AS Assignment

Owner name: LOOPPAY, INC., MASSACHUSETTS

Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:HUANG, ENYANG;GRAYLIN, WILLIAM WANG;WALLNER, GEORGE;SIGNING DATES FROM 20141001 TO 20150513;REEL/FRAME:035631/0491

AS Assignment

Owner name: SAMSUNG PAY, INC., MASSACHUSETTS

Free format text: CHANGE OF NAME;ASSIGNOR:LOOPPAY, INC.;REEL/FRAME:036887/0449

Effective date: 20150917

AS Assignment

Owner name: SAMSUNG ELECTRONICS CO., LTD., KOREA, REPUBLIC OF

Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:SAMSUNG PAY INC;REEL/FRAME:046044/0120

Effective date: 20180611

STPP Information on status: patent application and granting procedure in general

Free format text: NON FINAL ACTION MAILED

STPP Information on status: patent application and granting procedure in general

Free format text: RESPONSE TO NON-FINAL OFFICE ACTION ENTERED AND FORWARDED TO EXAMINER

STPP Information on status: patent application and granting procedure in general

Free format text: FINAL REJECTION MAILED

STCB Information on status: application discontinuation

Free format text: ABANDONED -- FAILURE TO RESPOND TO AN OFFICE ACTION